Analysis
-
max time kernel
56s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:16
Static task
static1
General
-
Target
RNSM00370.7z
-
Size
10.2MB
-
MD5
51604e584ac02ba7cbc1e0b988f52ff3
-
SHA1
441570eb9cec860cfc71bff92458981757476aa8
-
SHA256
25092371bd630f24a8de44508fa5f2d45145eff4c3b069bdc91eabc34063153e
-
SHA512
a1cd0e949fcae04ca9ef215cd957181634b609272ebe3e99e6299e6572ca7fb2644aedbf9cb812c153fb27bd7302739a86ec8f723d244db5184040cfdbb97a44
-
SSDEEP
196608:ti28AfEg2eqkWvCGjcBBGIs2/f/WlXu479C+NsP5f7J+iGuaLNXgPPSxU+:uA8teqvDYBhnC7c+NsP5A0PYU+
Malware Config
Extracted
emotet
Epoch1
187.162.62.135:80
181.231.72.200:80
45.55.83.204:8080
104.236.217.164:8080
128.199.78.227:8080
46.101.123.139:8080
185.94.252.27:443
181.171.118.19:80
46.21.105.59:8080
105.224.171.102:80
86.6.188.121:80
190.246.146.101:80
200.80.198.34:80
200.58.171.51:80
109.104.79.48:8080
89.134.144.41:8080
159.65.241.220:8080
186.23.146.42:80
203.25.159.3:8080
190.1.37.125:443
181.16.127.226:443
190.55.39.215:80
62.192.227.125:80
138.68.106.4:7080
91.205.215.57:7080
170.247.122.37:8080
201.219.183.243:443
190.193.131.141:443
23.92.22.225:7080
200.107.105.16:465
183.82.97.25:80
154.120.228.126:143
181.198.67.178:20
5.153.252.228:8080
187.188.166.192:80
81.183.213.36:80
201.251.229.37:80
104.236.151.95:7080
186.71.75.2:80
181.15.177.100:443
217.199.175.216:8080
187.242.204.142:80
190.13.211.174:21
190.97.10.198:80
190.186.221.50:80
45.32.158.232:7080
181.48.174.242:80
217.92.171.167:53
186.138.56.183:443
219.74.237.49:443
186.86.177.193:80
46.29.183.211:8080
91.83.93.124:7080
86.1.139.205:80
190.147.12.71:443
62.210.142.58:8080
70.32.84.74:8080
181.29.101.13:80
189.196.140.187:80
62.75.143.100:7080
85.132.96.242:80
46.32.228.206:8080
216.98.148.136:4143
178.79.163.131:8080
159.203.204.126:8080
201.212.24.6:443
66.209.69.165:443
217.113.27.158:443
200.28.131.215:443
103.201.150.209:80
69.163.33.82:8080
80.0.106.83:80
200.57.102.71:8443
181.36.42.205:443
72.47.248.48:8080
187.178.9.19:20
190.19.42.131:80
200.72.149.90:443
181.28.144.64:80
181.15.180.140:80
199.250.133.87:80
200.32.61.210:8080
190.246.166.217:80
81.143.213.156:7080
111.67.12.221:8080
196.6.112.70:443
181.228.60.191:80
37.59.1.74:8080
46.249.204.99:8080
190.230.60.129:80
79.143.182.254:8080
190.113.233.4:7080
213.120.104.180:50000
218.161.88.253:8080
185.86.148.222:8080
134.196.209.126:443
176.31.200.136:8080
191.97.116.232:443
86.42.166.147:80
186.23.18.211:443
190.117.206.153:443
43.229.62.186:8080
205.186.154.130:80
149.62.173.247:8080
71.244.60.231:8080
201.213.122.86:80
109.73.52.242:8080
181.15.243.22:80
181.134.105.191:80
185.129.93.140:80
162.217.250.243:7080
80.85.87.122:8080
181.39.134.122:80
45.73.124.235:8080
179.40.105.76:80
81.213.215.216:50000
5.79.119.1:8080
190.143.151.86:465
23.254.203.51:8080
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
218.54.30.235
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\#DECRYPT_MY_FILES#.html
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Extracted
darkcomet
Travian
google.serveftp.com:1515
DC_MUTEX-542ZEJN
-
gencode
jrjmU8cZXsP2
-
install
false
-
offline_keylogger
true
-
password
H91B4UD
-
persistence
false
Extracted
C:\Users\357002-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/F78B3F7D6B6DB3E2
http://decryptor.top/F78B3F7D6B6DB3E2
Signatures
-
Berbew family
-
Darkcomet family
-
Emotet family
-
GandCrab payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/3480-147-0x0000000000610000-0x0000000000627000-memory.dmp family_gandcrab behavioral1/memory/3480-146-0x0000000000400000-0x000000000045F000-memory.dmp family_gandcrab behavioral1/memory/1216-479-0x0000000000400000-0x000000000044C000-memory.dmp family_gandcrab behavioral1/memory/1216-482-0x00000000005D0000-0x00000000005E7000-memory.dmp family_gandcrab behavioral1/memory/2248-555-0x0000000002100000-0x0000000002117000-memory.dmp family_gandcrab behavioral1/memory/2248-554-0x0000000000400000-0x0000000000453000-memory.dmp family_gandcrab behavioral1/memory/5468-588-0x0000000000630000-0x0000000000647000-memory.dmp family_gandcrab behavioral1/memory/5468-587-0x0000000000400000-0x00000000004B7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Sality family
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Processes:
Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Urelas family
-
Processes:
Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (1416) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Disables RegEdit via registry modification 2 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Disables use of System Restore points 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe File created C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File created C:\Windows\SysWOW64\drivers\spools.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe -
Sets service image path in registry 2 TTPs 2 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral1/memory/5488-689-0x0000000074320000-0x0000000074329000-memory.dmp acprotect C:\Users\Admin\AppData\Local\Temp\nsu8307.tmp\SelfDel.dll acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe -
Executes dropped EXE 35 IoCs
Processes:
HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exeTrojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exeTrojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exeTrojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exeTrojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exeTrojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exessiinstall.exessiinstall.tmpTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exeTrojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exeTrojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exeTrojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exeTrojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exewmdtskcl.exeataidddsfmiiy.exeyhmbsqlpep.exesxpjxbmwlkipuld.exeSSIagent.exeTrojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exeTrojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exesetthelite.exeShell.exesetthelite.exeTrojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exeShell.exeShell.exey_installer.exepid process 4764 HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 3480 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe 1720 Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe 1076 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe 3748 Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe 2968 Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe 4220 Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe 2712 ssiinstall.exe 4232 ssiinstall.tmp 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe 3964 Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe 4592 Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe 1996 Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe 624 Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe 3884 Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe 2116 Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe 1044 Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe 1720 Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe 4796 wmdtskcl.exe 4052 ataidddsfmiiy.exe 1788 yhmbsqlpep.exe 2352 sxpjxbmwlkipuld.exe 1148 SSIagent.exe 2712 Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe 1216 Trojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exe 3620 setthelite.exe 1564 Shell.exe 4804 setthelite.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 5184 Shell.exe 5368 Shell.exe 5376 y_installer.exe -
Loads dropped DLL 8 IoCs
Processes:
HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exepid process 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe 512 HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe -
Modifies system executable filetype association 2 TTPs 15 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Uses the VBS compiler for execution 1 TTPs
-
Processes:
Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Adds Run key to start application 2 TTPs 18 IoCs
Processes:
ssiinstall.tmpTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exeTrojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSIagent = "C:\\Users\\Admin\\AppData\\Local\\SSI\\SSIagent.exe" ssiinstall.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msprivs = "C:\\Users\\Admin\\AppData\\Roaming\\windowforsmartinstall.exe" ssiinstall.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Font = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Font.exe" Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HpHfA3TWfbywp3Ah = "\"C:\\Users\\Admin\\Desktop\\00370\\Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe\" /SkipReg" Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSI = "C:\\Users\\Admin\\AppData\\Local\\SSI\\SSI.exe /byboot" ssiinstall.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe -
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exedescription ioc process File opened (read-only) \??\I: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1996-222-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe autoit_exe C:\Windows\SysWOW64\sxpjxbmwlkipuld.exe autoit_exe C:\Windows\SysWOW64\ataidddsfmiiy.exe autoit_exe C:\Windows\SysWOW64\yhmbsqlpep.exe autoit_exe C:\Windows\SysWOW64\wmdtskcl.exe autoit_exe -
Drops file in System32 directory 13 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exedescription ioc process File created C:\Windows\SysWOW64\sxpjxbmwlkipuld.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\sxpjxbmwlkipuld.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File created C:\Windows\SysWOW64\wmdtskcl.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File created C:\Windows\SysWOW64\Mig2.scr Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\SysWOW64\IExplorer.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File opened for modification C:\Windows\SysWOW64\userinit.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe File opened for modification C:\Windows\SysWOW64\yhmbsqlpep.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\wmdtskcl.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File created C:\Windows\SysWOW64\ataidddsfmiiy.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\ataidddsfmiiy.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\SysWOW64\shell.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\SysWOW64\shell.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\SysWOW64\yhmbsqlpep.exe Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe upx behavioral1/memory/4220-165-0x0000000000400000-0x00000000004B9000-memory.dmp upx C:\Windows\SysWOW64\drivers\spools.exe upx behavioral1/memory/4120-197-0x0000000000400000-0x000000000040F000-memory.dmp upx C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe upx C:\Users\Admin\cftmon.exe upx C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe upx behavioral1/memory/4592-213-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/4120-216-0x0000000000400000-0x000000000040F000-memory.dmp upx C:\Windows\SysWOW64\drivers\spools.exe upx behavioral1/memory/5788-580-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5776-579-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral1/memory/4220-576-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/4592-591-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/5488-689-0x0000000074320000-0x0000000074329000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\vizez.exe upx behavioral1/memory/4448-726-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/5776-730-0x0000000000400000-0x0000000000487000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\vizez.exe upx behavioral1/memory/5788-952-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5788-962-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5856-1648-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/5856-1802-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/6532-1805-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/6532-2212-0x0000000000400000-0x000000000048B000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\nsu8307.tmp\SelfDel.dll upx behavioral1/memory/6532-2291-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/7836-2303-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/864-2316-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/6884-2562-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\ms.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\external_extensions.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\CompressConvertTo.odt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.deps.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\DismountFind.pot Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\History.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Extensions\external_extensions.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\License.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.runtimeconfig.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.NETCore.App.runtimeconfig.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\ClearDisable.sql Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ThirdPartyNotices.ja-jp.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.runtimeconfig.json Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe -
Drops file in Windows directory 7 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exeTrojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exeWINWORD.EXETrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exedescription ioc process File created C:\Windows\e5852af Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe File opened for modification C:\Windows\SYSTEM.INI Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe File opened for modification C:\Windows\mydoc.rtf Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\xk.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe File created C:\Windows\xk.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 624 3480 WerFault.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe 4240 1720 WerFault.exe Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe 1376 3748 WerFault.exe Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe 2424 2968 WerFault.exe Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe 2288 3964 WerFault.exe Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe 1376 1216 WerFault.exe Trojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exe 5328 1720 WerFault.exe Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe 5620 2248 WerFault.exe Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 6128 5468 WerFault.exe Trojan-Ransom.Win32.GandCrypt.jhu-f2e4c6892704f1684806a033976a7a7c4e7a8dfc817054563795b325e4029c40.exe 6552 5396 WerFault.exe Trojan-Ransom.Win32.Sodin.adb-792262d1d6857fb92248022524d43b2127f913c857731d74a6f1589c50e15849.exe 9208 5748 WerFault.exe Trojan-Ransom.Win32.GandCrypt.xf-da8e7cf550e8ffb226418a12f91e38361117c4b7ea84f83d18d2f71f90fdf3ae.exe 3780 14300 WerFault.exe Qfolkcpb.exe 10516 5736 WerFault.exe Trojan-Ransom.Win32.GandCrypt.vf-ce5c683bf1b861e9ad8bb61b78d2d1100dbcf54544c90066e5e91595a79701d0.exe -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exeyhmbsqlpep.exeTrojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exesetthelite.execvtres.exevbc.exeTrojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exessiinstall.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exereg.exeTrojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.execvtres.exesetthelite.exey_installer.exeShell.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exeTrojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exeTrojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exevbc.exeTrojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exeTrojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exeTrojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exeTrojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exeShell.exessiinstall.tmpataidddsfmiiy.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exewmdtskcl.exeShell.exeSSIagent.exeTrojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exeTrojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exeTrojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exesxpjxbmwlkipuld.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhmbsqlpep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setthelite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssiinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setthelite.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssiinstall.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ataidddsfmiiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmdtskcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SSIagent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxpjxbmwlkipuld.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEIempingp.exepid process 5184 cmd.exe 5676 PING.EXE 12664 Iempingp.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 7440 vssadmin.exe -
Modifies Control Panel 4 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe -
Modifies registry class 26 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exeOpenWith.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FC8348588518913CD7587D91BCEEE134594A674E6337D69D" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7816BC1FE1D21A9D17AD0A28A7C906B" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32352C0B9C2483226D3F77D170532DDE7DF465D9" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB5B15C4795389F52CDBAA032EFD7CA" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCDF9BCFE14F19384783B4386963E96B0FA02FF43610239E2CB42EC08D5" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC67A15EDDBBFB8BC7CE5ED9637BC" Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 9424 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2312 WINWORD.EXE 2312 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exetaskmgr.exepowershell.exepid process 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 1144 powershell.exe 1144 powershell.exe 1144 powershell.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exetaskmgr.exepid process 4520 7zFM.exe 2916 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepowershell.exeTrojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exeTrojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exedescription pid process Token: SeRestorePrivilege 4520 7zFM.exe Token: 35 4520 7zFM.exe Token: SeSecurityPrivilege 4520 7zFM.exe Token: SeDebugPrivilege 2652 taskmgr.exe Token: SeSystemProfilePrivilege 2652 taskmgr.exe Token: SeCreateGlobalPrivilege 2652 taskmgr.exe Token: SeDebugPrivilege 2916 taskmgr.exe Token: SeSystemProfilePrivilege 2916 taskmgr.exe Token: SeCreateGlobalPrivilege 2916 taskmgr.exe Token: 33 2652 taskmgr.exe Token: SeIncBasePriorityPrivilege 2652 taskmgr.exe Token: SeDebugPrivilege 1144 powershell.exe Token: 33 1720 Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe Token: SeIncBasePriorityPrivilege 1720 Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe Token: SeDebugPrivilege 2116 Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe Token: 33 2916 taskmgr.exe Token: SeIncBasePriorityPrivilege 2916 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exetaskmgr.exepid process 4520 7zFM.exe 4520 7zFM.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2652 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe 2916 taskmgr.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
Processes:
Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exepid process 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe 2248 Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exeSSIagent.exeTrojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exeWINWORD.EXEOpenWith.exeShell.exeShell.exepid process 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe 624 Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe 1720 Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe 1148 SSIagent.exe 2712 Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe 2312 WINWORD.EXE 2312 WINWORD.EXE 2312 WINWORD.EXE 1828 OpenWith.exe 2312 WINWORD.EXE 1148 SSIagent.exe 1564 Shell.exe 5184 Shell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskmgr.exepowershell.execmd.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exeTrojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exessiinstall.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exedescription pid process target process PID 2652 wrote to memory of 2916 2652 taskmgr.exe taskmgr.exe PID 2652 wrote to memory of 2916 2652 taskmgr.exe taskmgr.exe PID 1144 wrote to memory of 2824 1144 powershell.exe cmd.exe PID 1144 wrote to memory of 2824 1144 powershell.exe cmd.exe PID 2824 wrote to memory of 4764 2824 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe PID 2824 wrote to memory of 4764 2824 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe PID 2824 wrote to memory of 4764 2824 cmd.exe HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe PID 2824 wrote to memory of 3580 2824 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe PID 2824 wrote to memory of 3580 2824 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe PID 2824 wrote to memory of 3580 2824 cmd.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe PID 2824 wrote to memory of 512 2824 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe PID 2824 wrote to memory of 512 2824 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe PID 2824 wrote to memory of 512 2824 cmd.exe HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe PID 2824 wrote to memory of 3480 2824 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe PID 2824 wrote to memory of 3480 2824 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe PID 2824 wrote to memory of 3480 2824 cmd.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe PID 2824 wrote to memory of 1720 2824 cmd.exe Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe PID 2824 wrote to memory of 1720 2824 cmd.exe Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe PID 2824 wrote to memory of 1720 2824 cmd.exe Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe PID 3580 wrote to memory of 1076 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe PID 3580 wrote to memory of 1076 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe PID 3580 wrote to memory of 1076 3580 HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe PID 2824 wrote to memory of 3748 2824 cmd.exe Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe PID 2824 wrote to memory of 3748 2824 cmd.exe Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe PID 2824 wrote to memory of 3748 2824 cmd.exe Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe PID 2824 wrote to memory of 2968 2824 cmd.exe Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe PID 2824 wrote to memory of 2968 2824 cmd.exe Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe PID 2824 wrote to memory of 2968 2824 cmd.exe Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe PID 2824 wrote to memory of 4220 2824 cmd.exe Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe PID 2824 wrote to memory of 4220 2824 cmd.exe Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe PID 2824 wrote to memory of 4220 2824 cmd.exe Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe PID 2824 wrote to memory of 3596 2824 cmd.exe Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe PID 2824 wrote to memory of 3596 2824 cmd.exe Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe PID 2824 wrote to memory of 3596 2824 cmd.exe Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe PID 3596 wrote to memory of 2712 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe PID 3596 wrote to memory of 2712 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe PID 3596 wrote to memory of 2712 3596 Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe PID 2712 wrote to memory of 4232 2712 ssiinstall.exe ssiinstall.tmp PID 2712 wrote to memory of 4232 2712 ssiinstall.exe ssiinstall.tmp PID 2712 wrote to memory of 4232 2712 ssiinstall.exe ssiinstall.tmp PID 2824 wrote to memory of 4120 2824 cmd.exe Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe PID 2824 wrote to memory of 4120 2824 cmd.exe Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe PID 2824 wrote to memory of 4120 2824 cmd.exe Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe PID 2824 wrote to memory of 3964 2824 cmd.exe Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe PID 2824 wrote to memory of 3964 2824 cmd.exe Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe PID 2824 wrote to memory of 3964 2824 cmd.exe Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe PID 4120 wrote to memory of 3604 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe reg.exe PID 4120 wrote to memory of 3604 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe reg.exe PID 4120 wrote to memory of 3604 4120 Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe reg.exe PID 2824 wrote to memory of 4592 2824 cmd.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe PID 2824 wrote to memory of 4592 2824 cmd.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe PID 2824 wrote to memory of 4592 2824 cmd.exe Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe PID 2824 wrote to memory of 1996 2824 cmd.exe Foakpc32.exe PID 2824 wrote to memory of 1996 2824 cmd.exe Foakpc32.exe PID 2824 wrote to memory of 1996 2824 cmd.exe Foakpc32.exe PID 2824 wrote to memory of 3884 2824 cmd.exe Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe PID 2824 wrote to memory of 3884 2824 cmd.exe Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe PID 2824 wrote to memory of 3884 2824 cmd.exe Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe PID 2824 wrote to memory of 624 2824 cmd.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe PID 2824 wrote to memory of 624 2824 cmd.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe PID 2824 wrote to memory of 624 2824 cmd.exe Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe PID 2824 wrote to memory of 2116 2824 cmd.exe Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe PID 2824 wrote to memory of 2116 2824 cmd.exe Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe PID 2824 wrote to memory of 2116 2824 cmd.exe Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe -
System policy modification 1 TTPs 5 IoCs
Processes:
Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00370.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4520
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe"C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.MSIL.Blocker.gen-b73d301801366ecfe94c69957f2f1d6e05b2e092d248bb1eb47cb6452046ace8.exe"4⤵PID:5272
-
-
-
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.Cryptor.gen-a338308294c10121d1709842785f31a0d3a0ab0417543e57ace0c6ac90d6152b.exe--6738d7b74⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-840140fa647a7476b4c7ff9ea92f4f70bb856aaa745bc8e3d962f03d9b48fd67.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:512 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --partner 351634 --distr /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5376 -
C:\Windows\SysWOW64\drivers\spools.exe"C:\Windows\SysWow64\drivers\spools.exe" "C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"5⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exeC:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe /quiet /msicl YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=6666⤵PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --stat dwnldr/p=351634/cnt=0/dt=3/ct=4/rt=0 --dh 2352 --st 17308450525⤵PID:388
-
-
-
-
C:\Users\Admin\Desktop\00370\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-f168c9f053048caff9b1e3df0bb9407819af757e6ab376543feea16d40af1675.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 4804⤵
- Program crash
PID:624
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exeTrojan-Ransom.Win32.Bitman.hob-358bd6bc6462b3c287452ccec7902a4166182d082cef008c04e1ee88e42632ad.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 2844⤵
- Program crash
PID:4240
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exeTrojan-Ransom.Win32.Bitman.qlg-e21f8248e401ffb67f8f883c6a43b5e7fdabde5b05673d937a47ad03fb1c7e10.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 3164⤵
- Program crash
PID:1376
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exeTrojan-Ransom.Win32.Bitman.qmf-006e647cde91bcef42389a3810eba495d8e4859a6ef1537e691a5644084e1310.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5164⤵
- Program crash
PID:2424
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exeTrojan-Ransom.Win32.Blocker.gfhu-18ff4a191ff5a58d6ec4a4ace69e293fd7e9cff3b273d2ed849fb21386cd0e35.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:4220
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exeTrojan-Ransom.Win32.Blocker.hvwp-9e5eca5bcfed0cb7732f4ab5fd72b22b33a078901f2283fb7dd36b10f66a9506.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\adm\ssiinstall.exeC:\Users\Admin\AppData\Local\Temp\\adm\ssiinstall.exe /VERYSILENT /SUPPRESSMSGBOXES4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\is-O1M7O.tmp\ssiinstall.tmp"C:\Users\Admin\AppData\Local\Temp\is-O1M7O.tmp\ssiinstall.tmp" /SL5="$90110,238879,138240,C:\Users\Admin\AppData\Local\Temp\adm\ssiinstall.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Users\Admin\AppData\Local\SSI\SSIagent.exe"C:\Users\Admin\AppData\Local\SSI\SSIagent.exe" /install6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exeTrojan-Ransom.Win32.Blocker.itys-d5765213d47dacc709e27d25c05a1894f21392bdf282e1f17601e1fbeb76ccf8.exe3⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f4⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
PID:3604
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exeTrojan-Ransom.Win32.Blocker.iwia-cd7cba96fb5cb9028ac7f08e365d05d828e323b5d09ca0c3ded9271b7535fc03.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 2404⤵
- Program crash
PID:2288
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exeTrojan-Ransom.Win32.Blocker.jaxq-bbe01b0ef6f8bebe716f520be741247ddd8b16498bdb4abcbf427a36268e1b0c.exe3⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4592
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exeTrojan-Ransom.Win32.Blocker.jckm-45fe181de3e2fe7bfafc6a531c57a484cdd4cbc84794562bd356e45db9425b23.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\yhmbsqlpep.exeyhmbsqlpep.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\wmdtskcl.exeC:\Windows\system32\wmdtskcl.exe5⤵PID:1420
-
-
-
C:\Windows\SysWOW64\sxpjxbmwlkipuld.exesxpjxbmwlkipuld.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\wmdtskcl.exewmdtskcl.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\Windows\SysWOW64\ataidddsfmiiy.exeataidddsfmiiy.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4052
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""4⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exeTrojan-Ransom.Win32.Blocker.maou-1b0dbd1f90b5c8e98312061e166f656c60942694643b425de8ba4fc84ce76c61.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exeTrojan-Ransom.Win32.Blocker.mtgn-c27684f0b601e19655dd37b5de66d8dd26e38bbd9cafa947f67268044c82ba0f.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:624 -
C:\Windows\xk.exeC:\Windows\xk.exe4⤵PID:4876
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵PID:6952
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵PID:6248
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵PID:6660
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:7656
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:6660
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:2860
-
-
C:\Windows\xk.exeC:\Windows\xk.exe4⤵PID:13808
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵PID:8900
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵PID:14168
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵PID:9124
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:13684
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:8960
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:9036
-
-
C:\Windows\xk.exeC:\Windows\xk.exe4⤵PID:8408
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵PID:2768
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵PID:7992
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵PID:268
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:6796
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:544
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:7412
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exeTrojan-Ransom.Win32.Blocker.rtc-70750a30c80adb1dd1cb2d804e9f52ae9a710e66c37e1bfe93955a3defa5a5da.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ucfbwyty.cmdline"4⤵
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES61B3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc13997417357D4C17824CAEAC822397A.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\frs14kbb.cmdline"4⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES68C7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9CEC3983BD184A4CA31B285E3BF762.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:3672
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵PID:1040
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵PID:6884
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exeTrojan-Ransom.Win32.Crypmod.xrl-a03bb7d426f6291e8daa6e6f34a14b2e27183356ced4be45649f81f3965d854c.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\shell.exe"C:\Windows\system32\shell.exe" "C:\Windows\System32\cmd.exe" /C vssadmin Delete Shadows /Quiet /All4⤵PID:9688
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exeTrojan-Ransom.Win32.Foreign.myji-bd99f98a715c23243f115c52078fcfa2a410772161af0a3400729955b17ec52f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 4764⤵
- Program crash
PID:5328 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5368
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5568
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exeTrojan-Ransom.Win32.Foreign.naej-75a3b0f83b71a9c8470400b89b1c4dc18caca41de9a8c0dd31016f136cc4182b.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exeTrojan-Ransom.Win32.GandCrypt.bvu-850f4297f77ab27e0f36f843d42c9e80142847888739e816676a720a64cd0143.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 4764⤵
- Program crash
PID:1376 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5184
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exeTrojan-Ransom.Win32.GandCrypt.cbc-3c30d6a831d7e0119da5f24fa42c26ad2c8882728429de2b07011b235b3273f8.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookAW
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 5004⤵
- Program crash
PID:5620 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5644
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5840
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.jhu-f2e4c6892704f1684806a033976a7a7c4e7a8dfc817054563795b325e4029c40.exeTrojan-Ransom.Win32.GandCrypt.jhu-f2e4c6892704f1684806a033976a7a7c4e7a8dfc817054563795b325e4029c40.exe3⤵PID:5468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 4884⤵
- Program crash
PID:6128 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5080
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:5588
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.pf-fec7120fce467903fe6e63ecd387c9c7a0c8c8394b3d9313c150727b3688991b.exeTrojan-Ransom.Win32.GandCrypt.pf-fec7120fce467903fe6e63ecd387c9c7a0c8c8394b3d9313c150727b3688991b.exe3⤵PID:5704
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.vf-ce5c683bf1b861e9ad8bb61b78d2d1100dbcf54544c90066e5e91595a79701d0.exeTrojan-Ransom.Win32.GandCrypt.vf-ce5c683bf1b861e9ad8bb61b78d2d1100dbcf54544c90066e5e91595a79701d0.exe3⤵PID:5736
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:5832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 344404⤵
- Program crash
PID:10516 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:9204
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:1956
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GandCrypt.xf-da8e7cf550e8ffb226418a12f91e38361117c4b7ea84f83d18d2f71f90fdf3ae.exeTrojan-Ransom.Win32.GandCrypt.xf-da8e7cf550e8ffb226418a12f91e38361117c4b7ea84f83d18d2f71f90fdf3ae.exe3⤵PID:5748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 4364⤵
- Program crash
PID:9208 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:8968
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"5⤵PID:8088
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Gen.kwn-096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exeTrojan-Ransom.Win32.Gen.kwn-096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exe3⤵PID:5764
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet & wmic.exe shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:6140
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3672
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.txt4⤵PID:7040
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.vbs4⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.html4⤵PID:6904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7fff6c5e46f8,0x7fff6c5e4708,0x7fff6c5e47185⤵PID:7076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:25⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:35⤵PID:7448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:85⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:15⤵PID:8180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:15⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:85⤵PID:10596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17356470524381770705,16655809370429887538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:85⤵PID:10736
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Gen.kwn-096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5184 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5676
-
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GenericCryptor.cys-65deb10e590983d9e8e09bba4fcec93b36987a54f09c0813eb644eb634ed7673.exeTrojan-Ransom.Win32.GenericCryptor.cys-65deb10e590983d9e8e09bba4fcec93b36987a54f09c0813eb644eb634ed7673.exe3⤵PID:5776
-
C:\Windows\SysWOW64\drivers\spools.exe"C:\Windows\SysWow64\drivers\spools.exe" "C:\Users\Admin\AppData\Local\Temp\vizez.exe"4⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\vizez.exeC:\Users\Admin\AppData\Local\Temp\vizez.exe5⤵PID:5856
-
-
-
C:\Windows\SysWOW64\shell.exe"C:\Windows\system32\shell.exe" "C:\Users\Admin\AppData\Local\Temp\_uinsey.bat"4⤵PID:1720
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.GenericCryptor.czx-dcb87bc736421f9f63203c74f9cd5548d1b5bfd47587d699915b528e38f4fffe.exeTrojan-Ransom.Win32.GenericCryptor.czx-dcb87bc736421f9f63203c74f9cd5548d1b5bfd47587d699915b528e38f4fffe.exe3⤵PID:5788
-
C:\Windows\SysWOW64\drivers\spools.exe"C:\Windows\SysWow64\drivers\spools.exe" "C:\Users\Admin\AppData\Local\Temp\vizez.exe"4⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\vizez.exeC:\Users\Admin\AppData\Local\Temp\vizez.exe5⤵PID:6532
-
-
-
C:\Windows\SysWOW64\shell.exe"C:\Windows\system32\shell.exe" "C:\Users\Admin\AppData\Local\Temp\_uinsey.bat"4⤵PID:440
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Locky.a-2b311111abb8fbc0591807f4f50132f87554cf37ee6aebfe40fad8bc28a0a391.exeTrojan-Ransom.Win32.Locky.a-2b311111abb8fbc0591807f4f50132f87554cf37ee6aebfe40fad8bc28a0a391.exe3⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵PID:5888
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7A4C.tmp"4⤵PID:5900
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exeTrojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exe3⤵PID:5816
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exeTrojan-Ransom.Win32.Onion.vwm-24b8a7ea4f027adb28c00bc8b4cf46ae40dbc23d577ec829dad79106a252bb74.exe4⤵PID:6120
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.PolyRansom.bix-20fc16ef4cbf2b2fa836f7676636a2f21e1e3fb3dc0a7e104c74eb948f0029d5.exeTrojan-Ransom.Win32.PolyRansom.bix-20fc16ef4cbf2b2fa836f7676636a2f21e1e3fb3dc0a7e104c74eb948f0029d5.exe3⤵PID:5488
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe4⤵PID:5548
-
-
C:\Windows\SysWOW64\windihallssvc.exe"C:\Windows\System32\windihallssvc.exe" /i4⤵PID:6048
-
-
C:\Windows\SysWOW64\windihallssvc.exe"C:\Windows\System32\windihallssvc.exe" /start4⤵PID:5776
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe" /stop4⤵PID:5124
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.da.exe" /u4⤵PID:5908
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe" /i4⤵PID:5172
-
-
C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe"C:\Program Files (x86)\ModinHalls\mdihallsymsvc.exe" /start4⤵PID:6280
-
-
-
C:\Users\Admin\Desktop\00370\Trojan-Ransom.Win32.PornoAsset.cwjb-2edf4ecb1c75775c6e585b42746115f02523fedd65f92e23d74b7d8957e7292e.exeTrojan-Ransom.Win32.PornoAsset.cwjb-2edf4ecb1c75775c6e585b42746115f02523fedd65f92e23d74b7d8957e7292e.exe3⤵PID:5868
-
C:\Windows\SysWOW64\Akfdcq32.exeC:\Windows\system32\Akfdcq32.exe4⤵PID:2784
-
C:\Windows\SysWOW64\Adnilfnl.exeC:\Windows\system32\Adnilfnl.exe5⤵PID:5780
-
C:\Windows\SysWOW64\Afnefieo.exeC:\Windows\system32\Afnefieo.exe6⤵PID:2600
-
C:\Windows\SysWOW64\Aohfdnil.exeC:\Windows\system32\Aohfdnil.exe7⤵PID:5632
-
C:\Windows\SysWOW64\Aeglbeea.exeC:\Windows\system32\Aeglbeea.exe8⤵PID:5436
-
C:\Windows\SysWOW64\Bnbmqjjo.exeC:\Windows\system32\Bnbmqjjo.exe9⤵PID:1028
-
C:\Windows\SysWOW64\Bflagg32.exeC:\Windows\system32\Bflagg32.exe10⤵PID:5844
-
C:\Windows\SysWOW64\Bkhjpn32.exeC:\Windows\system32\Bkhjpn32.exe11⤵PID:5668
-
C:\Windows\SysWOW64\Beaohcmf.exeC:\Windows\system32\Beaohcmf.exe12⤵PID:5824
-
C:\Windows\SysWOW64\Cbglgg32.exeC:\Windows\system32\Cbglgg32.exe13⤵PID:5212
-
C:\Windows\SysWOW64\Chfaenfb.exeC:\Windows\system32\Chfaenfb.exe14⤵PID:4852
-
C:\Windows\SysWOW64\Cfgace32.exeC:\Windows\system32\Cfgace32.exe15⤵PID:4864
-
C:\Windows\SysWOW64\Cnbfgh32.exeC:\Windows\system32\Cnbfgh32.exe16⤵PID:3140
-
C:\Windows\SysWOW64\Cihjeq32.exeC:\Windows\system32\Cihjeq32.exe17⤵PID:224
-
C:\Windows\SysWOW64\Cfljnejl.exeC:\Windows\system32\Cfljnejl.exe18⤵PID:2972
-
C:\Windows\SysWOW64\Dpdogj32.exeC:\Windows\system32\Dpdogj32.exe19⤵PID:4376
-
C:\Windows\SysWOW64\Dojlhg32.exeC:\Windows\system32\Dojlhg32.exe20⤵PID:5264
-
C:\Windows\SysWOW64\Diopep32.exeC:\Windows\system32\Diopep32.exe21⤵PID:4436
-
C:\Windows\SysWOW64\Dfcqod32.exeC:\Windows\system32\Dfcqod32.exe22⤵PID:5280
-
C:\Windows\SysWOW64\Donecfao.exeC:\Windows\system32\Donecfao.exe23⤵PID:5864
-
C:\Windows\SysWOW64\Dehnpp32.exeC:\Windows\system32\Dehnpp32.exe24⤵PID:5840
-
C:\Windows\SysWOW64\Doqbifpl.exeC:\Windows\system32\Doqbifpl.exe25⤵PID:5268
-
C:\Windows\SysWOW64\Eldbbjof.exeC:\Windows\system32\Eldbbjof.exe26⤵PID:1612
-
C:\Windows\SysWOW64\Elgohj32.exeC:\Windows\system32\Elgohj32.exe27⤵PID:3596
-
C:\Windows\SysWOW64\Elilmi32.exeC:\Windows\system32\Elilmi32.exe28⤵PID:3104
-
C:\Windows\SysWOW64\Eohhie32.exeC:\Windows\system32\Eohhie32.exe29⤵PID:3412
-
C:\Windows\SysWOW64\Ebeapc32.exeC:\Windows\system32\Ebeapc32.exe30⤵PID:5200
-
C:\Windows\SysWOW64\Ehbihj32.exeC:\Windows\system32\Ehbihj32.exe31⤵PID:6004
-
C:\Windows\SysWOW64\Fgcjea32.exeC:\Windows\system32\Fgcjea32.exe32⤵PID:5504
-
C:\Windows\SysWOW64\Flpbnh32.exeC:\Windows\system32\Flpbnh32.exe33⤵PID:3928
-
C:\Windows\SysWOW64\Fgffka32.exeC:\Windows\system32\Fgffka32.exe34⤵PID:464
-
C:\Windows\SysWOW64\Foakpc32.exeC:\Windows\system32\Foakpc32.exe35⤵PID:1996
-
C:\Windows\SysWOW64\Fifomlap.exeC:\Windows\system32\Fifomlap.exe36⤵PID:4012
-
C:\Windows\SysWOW64\Fcodfa32.exeC:\Windows\system32\Fcodfa32.exe37⤵PID:4976
-
C:\Windows\SysWOW64\Ggoiap32.exeC:\Windows\system32\Ggoiap32.exe38⤵PID:1336
-
C:\Windows\SysWOW64\Gojnfb32.exeC:\Windows\system32\Gojnfb32.exe39⤵PID:5148
-
C:\Windows\SysWOW64\Glnnofhi.exeC:\Windows\system32\Glnnofhi.exe40⤵PID:3924
-
C:\Windows\SysWOW64\Giboijgb.exeC:\Windows\system32\Giboijgb.exe41⤵PID:5408
-
C:\Windows\SysWOW64\Ggfobofl.exeC:\Windows\system32\Ggfobofl.exe42⤵PID:2800
-
C:\Windows\SysWOW64\Ggilgn32.exeC:\Windows\system32\Ggilgn32.exe43⤵PID:5328
-
C:\Windows\SysWOW64\Hjieii32.exeC:\Windows\system32\Hjieii32.exe44⤵PID:1556
-
C:\Windows\SysWOW64\Hjnndime.exeC:\Windows\system32\Hjnndime.exe45⤵PID:5792
-
C:\Windows\SysWOW64\Hfgloiqf.exeC:\Windows\system32\Hfgloiqf.exe46⤵PID:5944
-
C:\Windows\SysWOW64\Imcqacfq.exeC:\Windows\system32\Imcqacfq.exe47⤵PID:5372
-
C:\Windows\SysWOW64\Imfmgcdn.exeC:\Windows\system32\Imfmgcdn.exe48⤵PID:4388
-
C:\Windows\SysWOW64\Ifqoehhl.exeC:\Windows\system32\Ifqoehhl.exe49⤵PID:3004
-
C:\Windows\SysWOW64\Ioicnn32.exeC:\Windows\system32\Ioicnn32.exe50⤵PID:5948
-
C:\Windows\SysWOW64\Jonlimkg.exeC:\Windows\system32\Jonlimkg.exe51⤵PID:5124
-
C:\Windows\SysWOW64\Jginej32.exeC:\Windows\system32\Jginej32.exe52⤵PID:6200
-
C:\Windows\SysWOW64\Kcbkpj32.exeC:\Windows\system32\Kcbkpj32.exe53⤵PID:6352
-
C:\Windows\SysWOW64\Kgqdfi32.exeC:\Windows\system32\Kgqdfi32.exe54⤵PID:6456
-
C:\Windows\SysWOW64\Kaihonhl.exeC:\Windows\system32\Kaihonhl.exe55⤵PID:6592
-
C:\Windows\SysWOW64\Kpnepk32.exeC:\Windows\system32\Kpnepk32.exe56⤵PID:6700
-
C:\Windows\SysWOW64\Kanbjn32.exeC:\Windows\system32\Kanbjn32.exe57⤵PID:6748
-
C:\Windows\SysWOW64\Ljffccjh.exeC:\Windows\system32\Ljffccjh.exe58⤵PID:6808
-
C:\Windows\SysWOW64\Lhopgg32.exeC:\Windows\system32\Lhopgg32.exe59⤵PID:7000
-
C:\Windows\SysWOW64\Mhefhf32.exeC:\Windows\system32\Mhefhf32.exe60⤵PID:6600
-
C:\Windows\SysWOW64\Mjfoja32.exeC:\Windows\system32\Mjfoja32.exe61⤵PID:6604
-
C:\Windows\SysWOW64\Mdaqhf32.exeC:\Windows\system32\Mdaqhf32.exe62⤵PID:6292
-
C:\Windows\SysWOW64\Nmnnlk32.exeC:\Windows\system32\Nmnnlk32.exe63⤵PID:7360
-
C:\Windows\SysWOW64\Nhhldc32.exeC:\Windows\system32\Nhhldc32.exe64⤵PID:7548
-
C:\Windows\SysWOW64\Niihlkdm.exeC:\Windows\system32\Niihlkdm.exe65⤵PID:7620
-
C:\Windows\SysWOW64\Ohaokbfd.exeC:\Windows\system32\Ohaokbfd.exe66⤵PID:7940
-
C:\Windows\SysWOW64\Pgihanii.exeC:\Windows\system32\Pgihanii.exe67⤵PID:8040
-
C:\Windows\SysWOW64\Pdofpb32.exeC:\Windows\system32\Pdofpb32.exe68⤵PID:8152
-
C:\Windows\SysWOW64\Phpklp32.exeC:\Windows\system32\Phpklp32.exe69⤵PID:7240
-
C:\Windows\SysWOW64\Qpmmfbfl.exeC:\Windows\system32\Qpmmfbfl.exe70⤵PID:6916
-
C:\Windows\SysWOW64\Akenij32.exeC:\Windows\system32\Akenij32.exe71⤵PID:7568
-
C:\Windows\SysWOW64\Anhcpeon.exeC:\Windows\system32\Anhcpeon.exe72⤵PID:2292
-
C:\Windows\SysWOW64\Akopoi32.exeC:\Windows\system32\Akopoi32.exe73⤵PID:7736
-
C:\Windows\SysWOW64\Bkamdi32.exeC:\Windows\system32\Bkamdi32.exe74⤵PID:4608
-
C:\Windows\SysWOW64\Bnaffdfc.exeC:\Windows\system32\Bnaffdfc.exe75⤵PID:6696
-
C:\Windows\SysWOW64\Bkhceh32.exeC:\Windows\system32\Bkhceh32.exe76⤵PID:7248
-
C:\Windows\SysWOW64\Bgodjiio.exeC:\Windows\system32\Bgodjiio.exe77⤵PID:6452
-
C:\Windows\SysWOW64\Cebdcmhh.exeC:\Windows\system32\Cebdcmhh.exe78⤵PID:7224
-
C:\Windows\SysWOW64\Ckmmpg32.exeC:\Windows\system32\Ckmmpg32.exe79⤵PID:3112
-
C:\Windows\SysWOW64\Cqiehnml.exeC:\Windows\system32\Cqiehnml.exe80⤵PID:6636
-
C:\Windows\SysWOW64\Cgcmeh32.exeC:\Windows\system32\Cgcmeh32.exe81⤵PID:7048
-
C:\Windows\SysWOW64\Cgejkh32.exeC:\Windows\system32\Cgejkh32.exe82⤵PID:3096
-
C:\Windows\SysWOW64\Cnpbgajc.exeC:\Windows\system32\Cnpbgajc.exe83⤵PID:5532
-
C:\Windows\SysWOW64\Dndlba32.exeC:\Windows\system32\Dndlba32.exe84⤵PID:7028
-
C:\Windows\SysWOW64\Dioiki32.exeC:\Windows\system32\Dioiki32.exe85⤵PID:7104
-
C:\Windows\SysWOW64\Dalkek32.exeC:\Windows\system32\Dalkek32.exe86⤵PID:6256
-
C:\Windows\SysWOW64\Eblgon32.exeC:\Windows\system32\Eblgon32.exe87⤵PID:7012
-
C:\Windows\SysWOW64\Engaon32.exeC:\Windows\system32\Engaon32.exe88⤵PID:3176
-
C:\Windows\SysWOW64\Eeailhme.exeC:\Windows\system32\Eeailhme.exe89⤵PID:7272
-
C:\Windows\SysWOW64\Ebejem32.exeC:\Windows\system32\Ebejem32.exe90⤵PID:3956
-
C:\Windows\SysWOW64\Fhbbmc32.exeC:\Windows\system32\Fhbbmc32.exe91⤵PID:7764
-
C:\Windows\SysWOW64\Fbggkl32.exeC:\Windows\system32\Fbggkl32.exe92⤵PID:4800
-
C:\Windows\SysWOW64\Falcli32.exeC:\Windows\system32\Falcli32.exe93⤵PID:7980
-
C:\Windows\SysWOW64\Fkehdnee.exeC:\Windows\system32\Fkehdnee.exe94⤵PID:8100
-
C:\Windows\SysWOW64\Faopah32.exeC:\Windows\system32\Faopah32.exe95⤵PID:7932
-
C:\Windows\SysWOW64\Flddoa32.exeC:\Windows\system32\Flddoa32.exe96⤵PID:6408
-
C:\Windows\SysWOW64\Focakm32.exeC:\Windows\system32\Focakm32.exe97⤵PID:8064
-
C:\Windows\SysWOW64\Fkiapn32.exeC:\Windows\system32\Fkiapn32.exe98⤵PID:8060
-
C:\Windows\SysWOW64\Ghmbib32.exeC:\Windows\system32\Ghmbib32.exe99⤵PID:7176
-
C:\Windows\SysWOW64\Glkkop32.exeC:\Windows\system32\Glkkop32.exe100⤵PID:6692
-
C:\Windows\SysWOW64\Ghbkdald.exeC:\Windows\system32\Ghbkdald.exe101⤵PID:6504
-
C:\Windows\SysWOW64\Geflne32.exeC:\Windows\system32\Geflne32.exe102⤵PID:7116
-
C:\Windows\SysWOW64\Gkeakl32.exeC:\Windows\system32\Gkeakl32.exe103⤵PID:392
-
C:\Windows\SysWOW64\Haafnf32.exeC:\Windows\system32\Haafnf32.exe104⤵PID:5852
-
C:\Windows\SysWOW64\Hkjjfkcm.exeC:\Windows\system32\Hkjjfkcm.exe105⤵PID:7324
-
C:\Windows\SysWOW64\Hikkdc32.exeC:\Windows\system32\Hikkdc32.exe106⤵PID:6984
-
C:\Windows\SysWOW64\Hhpheo32.exeC:\Windows\system32\Hhpheo32.exe107⤵PID:7684
-
C:\Windows\SysWOW64\Hipdpbgf.exeC:\Windows\system32\Hipdpbgf.exe108⤵PID:7464
-
C:\Windows\SysWOW64\Iefedcmk.exeC:\Windows\system32\Iefedcmk.exe109⤵PID:7872
-
C:\Windows\SysWOW64\Ikcmmjkb.exeC:\Windows\system32\Ikcmmjkb.exe110⤵PID:4116
-
C:\Windows\SysWOW64\Lpdefc32.exeC:\Windows\system32\Lpdefc32.exe111⤵PID:6828
-
C:\Windows\SysWOW64\Limioiia.exeC:\Windows\system32\Limioiia.exe112⤵PID:3396
-
C:\Windows\SysWOW64\Llpofd32.exeC:\Windows\system32\Llpofd32.exe113⤵PID:6168
-
C:\Windows\SysWOW64\Miflehaf.exeC:\Windows\system32\Miflehaf.exe114⤵PID:7712
-
C:\Windows\SysWOW64\Mihikgod.exeC:\Windows\system32\Mihikgod.exe115⤵PID:7992
-
C:\Windows\SysWOW64\Mpbaga32.exeC:\Windows\system32\Mpbaga32.exe116⤵PID:7508
-
C:\Windows\SysWOW64\Mlialb32.exeC:\Windows\system32\Mlialb32.exe117⤵PID:6028
-
C:\Windows\SysWOW64\Mjjbjjdd.exeC:\Windows\system32\Mjjbjjdd.exe118⤵PID:4904
-
C:\Windows\SysWOW64\Nbhcdl32.exeC:\Windows\system32\Nbhcdl32.exe119⤵PID:4744
-
C:\Windows\SysWOW64\Nbjpjl32.exeC:\Windows\system32\Nbjpjl32.exe120⤵PID:7228
-
C:\Windows\SysWOW64\Ndjldo32.exeC:\Windows\system32\Ndjldo32.exe121⤵PID:6848
-
C:\Windows\SysWOW64\Nmbamdkm.exeC:\Windows\system32\Nmbamdkm.exe122⤵PID:544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-