Analysis
-
max time kernel
66s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00362.7z
Resource
win7-20240903-en
Errors
General
-
Target
RNSM00362.7z
-
Size
27.1MB
-
MD5
8b0f9c502b9e988dc9c305334c471e27
-
SHA1
80fe06daafc1dfad0ba969ea1d7fe84953b9585a
-
SHA256
84b6a47228a3cc2d960f96975807f1424f24efd34140bcee4978c544112e1b14
-
SHA512
3c1f7c0455817610cd78ed29ca0e37e6fd8b2f4415947dd1a60f41a8b20770bc24203c263c5530f4d28e6613e202a6088b99179888f5972b5f43c3d99ccd5a23
-
SSDEEP
393216:NreVFOQDohdmEKs8PWs3zJ2quzEBUlKyzf8vbMqBBS3ohAz9GF5NLcPBC2Bm:NrsFp22WUA6i8v/BXM9GF5NEhw
Malware Config
Extracted
azorult
http://admin.svapofit.com/azs/index.php
Extracted
gozi
Extracted
gozi
1000
wetareska.com
bergesoma.com
-
exe_type
worker
-
server_id
12
Extracted
C:\Users\Admin\Music\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Emotet family
-
GandCrab payload 2 IoCs
resource yara_rule behavioral1/memory/2176-170-0x000000000FE40000-0x000000000FE5B000-memory.dmp family_gandcrab behavioral1/files/0x0005000000019535-163.dat family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Gozi family
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,,C:\\Users\\Admin\\AppData\\Local\\gjfkmqrl\\opwwatbc.exe" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Local\\gjfkmqrl\\opwwatbc.exe" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
Ramnit family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
Contacts a large (7704) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2652-6634-0x0000000003240000-0x000000000326F000-memory.dmp Nirsoft -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2652-6634-0x0000000003240000-0x000000000326F000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2652-6634-0x0000000003240000-0x000000000326F000-memory.dmp WebBrowserPassView -
resource yara_rule behavioral1/files/0x000500000001927a-75.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opwwatbc.exe Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\opwwatbc.exe Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe -
Executes dropped EXE 43 IoCs
pid Process 2888 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe 1808 HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe 2024 HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe 2804 HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 1208 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 2860 HEUR-Trojan-Ransom.Win32.Encoder.gen-7b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118.exe 2952 Trojan-Ransom.Win32.Blocker.lcym-299f0c0eb83c24099d59635974b4e26447695ff4dfc43a5d635eb548963e8eb2.exe 1796 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe 2652 Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe 2392 Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe 2104 Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe 2268 Trojan-Ransom.Win32.Foreign.nysp-1540e3fdbc52ad3de631bf66af69bff0e88c38981a06a74ecab16a2a739e7111.exe 2120 Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe 940 Trojan-Ransom.Win32.Gen.djd-201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9.exe 1952 Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe 3052 Trojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exe 1084 Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe 1344 Trojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exe 2944 Trojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exe 2236 Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe 1240 Trojan-Ransom.Win32.Crypmod.absj-d531ab589af63660210359ee898d845cb79d6799c70882932d9f191b2e322f66.exe 2108 Trojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exe 2052 Trojan-Ransom.Win32.Foreign.zhs-b97827f56e5d80a8ea6d929cbd85c29a45f3fb7ed2da237c819535229ea91f91.exe 416 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe 2740 VHO-Trojan-Ransom.Win32.CryFile.gen-9a78b34c50b14d1da2e250fa837fb3afeb767d1fd0e2708dde3dc597fe225456.exe 2176 VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe 1900 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe 3044 Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe 1636 Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe 904 HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe 1768 VHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exe 1932 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe 1576 nvc32.exe 3952 Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe 1400 sonickey.exe 3100 Rj3fNWF3.exe 2364 sonickey.exe 3728 Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe 2752 Rj3fNWF3.exe 2584 Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe 1252 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe 3216 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe -
Loads dropped DLL 9 IoCs
pid Process 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 2860 HEUR-Trojan-Ransom.Win32.Encoder.gen-7b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118.exe 1084 Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe 2392 Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe 2392 Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe 1952 Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe 1952 Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe 1952 Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe 3044 Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe" Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\OpwWatbc = "C:\\Users\\Admin\\AppData\\Local\\gjfkmqrl\\opwwatbc.exe" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom = "C:\\Users\\Admin\\Desktop\\00362\\Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe" Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\krhpgjfsjhn = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\kpqgiy.exe\"" VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Keylogger = "C:\\Users\\Admin\\AppData\\Local\\nvc32.exe" nvc32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
Drops desktop.ini file(s) 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\H: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\T: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\A: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\B: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\G: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\Z: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\E: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\O: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\V: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\X: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\K: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\R: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\U: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\W: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\S: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\M: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\P: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\J: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\L: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\N: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\Q: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\Y: VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe -
System Binary Proxy Execution: Verclsid 1 TTPs 1 IoCs
Adversaries may abuse Verclsid to proxy execution of malicious code.
pid Process 3452 verclsid.exe -
Drops autorun.inf file 1 TTPs 6 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened for modification C:\AUTORUN.INF Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification F:\AUTORUN.INF Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created \??\c:\AUTORUN.INF VHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exe File opened for modification \??\c:\AUTORUN.INF VHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exe File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe File created C:\Windows\SysWOW64\shell.exe Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe File created C:\Windows\SysWOW64\Mig2.scr Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe File created C:\Windows\SysWOW64\IExplorer.exe Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2024 HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 316 set thread context of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 1900 set thread context of 1932 1900 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe 72 PID 1084 set thread context of 3728 1084 Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe 86 PID 416 set thread context of 1252 416 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe 92 -
resource yara_rule behavioral1/memory/2176-170-0x000000000FE40000-0x000000000FE5B000-memory.dmp upx behavioral1/memory/2108-168-0x0000000000400000-0x00000000004D9000-memory.dmp upx behavioral1/memory/1344-188-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1344-186-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1344-185-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1344-184-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1344-183-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/files/0x0005000000019535-163.dat upx behavioral1/files/0x00050000000193dc-154.dat upx behavioral1/files/0x000500000001a447-465.dat upx behavioral1/memory/1344-546-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1932-568-0x0000000015190000-0x00000000151CD000-memory.dmp upx behavioral1/memory/1932-567-0x0000000015190000-0x00000000151CD000-memory.dmp upx behavioral1/memory/1932-566-0x0000000015190000-0x00000000151CD000-memory.dmp upx behavioral1/memory/2652-91-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2652-1293-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2108-1373-0x0000000000400000-0x00000000004D9000-memory.dmp upx behavioral1/memory/1636-1709-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral1/memory/3728-1711-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3728-1713-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3728-1714-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3728-1712-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3728-1717-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/3728-3150-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/4972-5102-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2652-7547-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\highDpiImageSwap.js Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_specialocc_Thumbnail.bmp Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\platform.xml.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_m.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\THMBNAIL.PNG.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01586_.WMF Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\epl-v10.html.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-impl.xml Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\PREVIEW.GIF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-windows.xml Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host.xml.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeAUM_rootCert.cer Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\PREVIEW.GIF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00171_.GIF Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rightnav.gif Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluHandle.png.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-actions.xml.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00390_.WMF Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-changjei.xml Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCallbacks.h.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mouseover.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\ED00184_.WMF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-ui.xml.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\PREVIEW.GIF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00172_.GIF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\library.js Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\SETUP.XML.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01631_.WMF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipBand.dll.mui Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InputPersonalization.exe.mui Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01167_.WMF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\7-Zip\Lang\pt.txt.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\METCONV.TXT.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-uihandler.xml.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-spi-quicksearch.xml.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Mso Example Intl Setup File A.txt.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\gadget.xml Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\ExcelMUI.XML.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files\7-Zip\Lang\kab.txt.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-border.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00167_.GIF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00141_.WMF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-modules-appui.xml.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\AccessMUISet.XML.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\picturePuzzle.html Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00902_.WMF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-highlight.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOffNotificationInTray.gif.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00444_.WMF.id-621036A5.[[email protected]].combo Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\hprof-16.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util.xml Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-gibbous_partly-cloudy.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\GrooveMUI.XML Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrenalm.dat Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\cpu.js Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe File created C:\Windows\xk.exe Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3984 2104 WerFault.exe 49 5092 2740 WerFault.exe 65 4536 1808 WerFault.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sonickey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-7b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nysp-1540e3fdbc52ad3de631bf66af69bff0e88c38981a06a74ecab16a2a739e7111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lcym-299f0c0eb83c24099d59635974b4e26447695ff4dfc43a5d635eb548963e8eb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.CryFile.gen-9a78b34c50b14d1da2e250fa837fb3afeb767d1fd0e2708dde3dc597fe225456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rj3fNWF3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gen.djd-201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sonickey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.absj-d531ab589af63660210359ee898d845cb79d6799c70882932d9f191b2e322f66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0005000000019508-106.dat nsis_installer_1 behavioral1/files/0x0005000000019508-106.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3976 vssadmin.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\ Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\00362\,-\0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™Š›ŒŽŸ ¡¢£¤¥¦§¨©ª«¬®¯‰ Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe File opened for modification C:\Users\Admin\Desktop\00362\,-\0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™Š›ŒŽŸ ¡¢£¤¥¦§¨©ª«¬®¯‰ Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe File opened for modification C:\Users\Admin\Desktop\00362\,-\0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™Š›ŒŽŸ ¡¢£¤¥¦§¨©ª«¬®¯‰ Rj3fNWF3.exe File opened for modification C:\Users\Admin\Desktop\00362\,-\0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™Š›ŒŽŸ ¡¢£¤¥¦§¨©ª«¬®¯‰ Rj3fNWF3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3468 schtasks.exe 2284 schtasks.exe 3356 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2392 Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe 1576 nvc32.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 30 IoCs
pid Process 2888 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe 1808 HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe 2024 HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe 2804 HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe 2860 HEUR-Trojan-Ransom.Win32.Encoder.gen-7b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 1796 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe 2652 Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe 2952 Trojan-Ransom.Win32.Blocker.lcym-299f0c0eb83c24099d59635974b4e26447695ff4dfc43a5d635eb548963e8eb2.exe 2944 Trojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exe 2392 Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe 2236 Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe 2104 Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe 1240 Trojan-Ransom.Win32.Crypmod.absj-d531ab589af63660210359ee898d845cb79d6799c70882932d9f191b2e322f66.exe 2268 Trojan-Ransom.Win32.Foreign.nysp-1540e3fdbc52ad3de631bf66af69bff0e88c38981a06a74ecab16a2a739e7111.exe 2108 Trojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exe 2120 Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe 2052 Trojan-Ransom.Win32.Foreign.zhs-b97827f56e5d80a8ea6d929cbd85c29a45f3fb7ed2da237c819535229ea91f91.exe 940 Trojan-Ransom.Win32.Gen.djd-201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9.exe 416 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe 1952 Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe 1900 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe 3052 Trojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exe 3044 Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe 1084 Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe 1636 Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe 1344 Trojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exe 2740 VHO-Trojan-Ransom.Win32.CryFile.gen-9a78b34c50b14d1da2e250fa837fb3afeb767d1fd0e2708dde3dc597fe225456.exe 1768 VHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exe 2176 VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 taskmgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1084 Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeRestorePrivilege 1236 7zFM.exe Token: 35 1236 7zFM.exe Token: SeSecurityPrivilege 1236 7zFM.exe Token: SeDebugPrivilege 2672 taskmgr.exe Token: SeSecurityPrivilege 1932 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Token: SeRestorePrivilege 1932 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Token: SeBackupPrivilege 1932 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Token: SeShutdownPrivilege 1932 Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe Token: SeDebugPrivilege 1808 HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe Token: 33 1808 HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe Token: SeIncBasePriorityPrivilege 1808 HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe Token: SeDebugPrivilege 2888 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe Token: 33 2888 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe Token: SeIncBasePriorityPrivilege 2888 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1236 7zFM.exe 1236 7zFM.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2108 Trojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exe 2108 Trojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe 2672 taskmgr.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2652 Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe 416 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe 2944 Trojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exe 2392 Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe 2120 Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe 1636 Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe 1636 Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe 1636 Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe 1576 nvc32.exe 1576 nvc32.exe 1576 nvc32.exe 416 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe 3216 Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe -
Suspicious use of UnmapMainImage 5 IoCs
pid Process 2804 HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe 1344 Trojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exe 904 HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe 1400 sonickey.exe 2364 sonickey.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2888 2308 cmd.exe 36 PID 2308 wrote to memory of 2888 2308 cmd.exe 36 PID 2308 wrote to memory of 2888 2308 cmd.exe 36 PID 2308 wrote to memory of 2888 2308 cmd.exe 36 PID 2308 wrote to memory of 1808 2308 cmd.exe 37 PID 2308 wrote to memory of 1808 2308 cmd.exe 37 PID 2308 wrote to memory of 1808 2308 cmd.exe 37 PID 2308 wrote to memory of 1808 2308 cmd.exe 37 PID 2308 wrote to memory of 2024 2308 cmd.exe 38 PID 2308 wrote to memory of 2024 2308 cmd.exe 38 PID 2308 wrote to memory of 2024 2308 cmd.exe 38 PID 2308 wrote to memory of 2024 2308 cmd.exe 38 PID 2308 wrote to memory of 2804 2308 cmd.exe 39 PID 2308 wrote to memory of 2804 2308 cmd.exe 39 PID 2308 wrote to memory of 2804 2308 cmd.exe 39 PID 2308 wrote to memory of 2804 2308 cmd.exe 39 PID 2308 wrote to memory of 2860 2308 cmd.exe 40 PID 2308 wrote to memory of 2860 2308 cmd.exe 40 PID 2308 wrote to memory of 2860 2308 cmd.exe 40 PID 2308 wrote to memory of 2860 2308 cmd.exe 40 PID 2308 wrote to memory of 316 2308 cmd.exe 41 PID 2308 wrote to memory of 316 2308 cmd.exe 41 PID 2308 wrote to memory of 316 2308 cmd.exe 41 PID 2308 wrote to memory of 316 2308 cmd.exe 41 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 316 wrote to memory of 1208 316 HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe 43 PID 2308 wrote to memory of 1796 2308 cmd.exe 42 PID 2308 wrote to memory of 1796 2308 cmd.exe 42 PID 2308 wrote to memory of 1796 2308 cmd.exe 42 PID 2308 wrote to memory of 1796 2308 cmd.exe 42 PID 2308 wrote to memory of 2652 2308 cmd.exe 44 PID 2308 wrote to memory of 2652 2308 cmd.exe 44 PID 2308 wrote to memory of 2652 2308 cmd.exe 44 PID 2308 wrote to memory of 2652 2308 cmd.exe 44 PID 2308 wrote to memory of 2952 2308 cmd.exe 45 PID 2308 wrote to memory of 2952 2308 cmd.exe 45 PID 2308 wrote to memory of 2952 2308 cmd.exe 45 PID 2308 wrote to memory of 2952 2308 cmd.exe 45 PID 2308 wrote to memory of 2944 2308 cmd.exe 46 PID 2308 wrote to memory of 2944 2308 cmd.exe 46 PID 2308 wrote to memory of 2944 2308 cmd.exe 46 PID 2308 wrote to memory of 2944 2308 cmd.exe 46 PID 2308 wrote to memory of 2392 2308 cmd.exe 47 PID 2308 wrote to memory of 2392 2308 cmd.exe 47 PID 2308 wrote to memory of 2392 2308 cmd.exe 47 PID 2308 wrote to memory of 2392 2308 cmd.exe 47 PID 2308 wrote to memory of 2236 2308 cmd.exe 48 PID 2308 wrote to memory of 2236 2308 cmd.exe 48 PID 2308 wrote to memory of 2236 2308 cmd.exe 48 PID 2308 wrote to memory of 2236 2308 cmd.exe 48 PID 2308 wrote to memory of 2104 2308 cmd.exe 49 PID 2308 wrote to memory of 2104 2308 cmd.exe 49 PID 2308 wrote to memory of 2104 2308 cmd.exe 49 PID 2308 wrote to memory of 2104 2308 cmd.exe 49 PID 2308 wrote to memory of 1240 2308 cmd.exe 50 PID 2308 wrote to memory of 1240 2308 cmd.exe 50 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00362.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1236
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2672
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 5123⤵
- Program crash
PID:4536
-
-
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exeHEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2024
-
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exeHEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:2804 -
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe--df59484e3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:904
-
-
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Encoder.gen-7b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-7b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2860
-
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exeHEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exeHEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe3⤵
- Executes dropped EXE
PID:1208
-
-
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1796
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exeTrojan-Ransom.Win32.Blocker.kpuo-ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Windows\xk.exeC:\Windows\xk.exe3⤵PID:4972
-
-
C:\Windows\xk.exeC:\Windows\xk.exe3⤵PID:1828
-
-
C:\Windows\xk.exeC:\Windows\xk.exe3⤵PID:760
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.lcym-299f0c0eb83c24099d59635974b4e26447695ff4dfc43a5d635eb548963e8eb2.exeTrojan-Ransom.Win32.Blocker.lcym-299f0c0eb83c24099d59635974b4e26447695ff4dfc43a5d635eb548963e8eb2.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2952
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exeTrojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exerojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exe3⤵PID:4960
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exeTrojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Users\Admin\AppData\Local\nvc32.exeC:\Users\Admin\AppData\Local\nvc32.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exeTrojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2236 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:1944
-
C:\Windows\system32\mode.commode con cp select=12514⤵PID:3504
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3976
-
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exeTrojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 1883⤵
- Program crash
PID:3984
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Crypmod.absj-d531ab589af63660210359ee898d845cb79d6799c70882932d9f191b2e322f66.exeTrojan-Ransom.Win32.Crypmod.absj-d531ab589af63660210359ee898d845cb79d6799c70882932d9f191b2e322f66.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1240 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\bz.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:3968
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.nysp-1540e3fdbc52ad3de631bf66af69bff0e88c38981a06a74ecab16a2a739e7111.exeTrojan-Ransom.Win32.Foreign.nysp-1540e3fdbc52ad3de631bf66af69bff0e88c38981a06a74ecab16a2a739e7111.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2268
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exeTrojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10F2\879.bat" "C:\Users\Admin\AppData\Roaming\cryppast\dpnadPnp.exe" "C:\Users\Admin\Desktop\00362\TR5AFE~1.EXE""3⤵PID:4944
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exeTrojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd73fe55db.bat"3⤵PID:2868
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.zhs-b97827f56e5d80a8ea6d929cbd85c29a45f3fb7ed2da237c819535229ea91f91.exeTrojan-Ransom.Win32.Foreign.zhs-b97827f56e5d80a8ea6d929cbd85c29a45f3fb7ed2da237c819535229ea91f91.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2052
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Gen.djd-201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9.exeTrojan-Ransom.Win32.Gen.djd-201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /xml "C:\Users\Admin\Desktop\00362\1.xml" /tn "Microsoft Update Scheduler" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
C:\Windows\SysWOW64\cmd.execmd /c 157641730997849.bat3⤵PID:3740
-
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs4⤵PID:4776
-
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exeTrojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"3⤵PID:3732
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exeTrojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵PID:4568
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:236
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2900
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5272
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5292
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5300
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3544
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3196
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1004
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5016
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4768
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4984
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4092
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2964
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5104
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3572
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5700
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3772
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4836
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4584
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:544
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4468
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5028
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3328
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5424
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5456
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5464
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5480
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5528
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5336
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3472
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5140
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5204
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4736
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:160
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6060
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1744
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5860
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5776
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5720
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3552
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4292
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4012
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4440
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2112
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:664
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4920
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4832
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5452
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1632
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5384
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5412
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5300
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5284
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:164
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4056
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5512
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5280
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1224
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2760
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:996
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1664
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5552
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6052
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5972
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3664
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2584
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5004
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4788
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2924
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2560
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2668
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3404
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5752
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2776
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4548
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4288
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4068
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4840
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6024
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4000
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3700
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3780
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5716
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3348
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3752
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2944
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4744
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5092
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4004
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2116
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5324
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5260
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5560
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5536
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5188
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4256
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4896
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4556
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6116
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1744
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3488
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5956
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5924
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6028
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4688
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:896
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2040
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3572
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4580
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5736
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3556
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1884
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4312
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4416
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4324
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4452
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4740
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4604
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4484
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2124
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3152
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1264
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5256
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4192
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3236
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4060
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3564
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4780
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5544
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2760
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5124
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6116
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4792
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2676
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2732
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5132
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5908
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2560
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5228
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4288
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3616
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1652
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3536
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3136
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5780
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5612
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2828
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2756
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2932
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6048
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4136
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3420
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4860
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2164
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2440
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3204
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5360
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5216
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6076
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5728
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5644
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4160
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2732
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5172
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3640
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6084
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4092
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3792
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5032
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5340
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3904
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3052
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:1060
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4916
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5768
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5888
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5248
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2368
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2300
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6072
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4428
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2640
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4824
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:940
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2632
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3472
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5352
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6052
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:4064
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5264
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5192
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5140
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5204
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6060
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:3452
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:660
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:6036
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:2680
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5104
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe" g5⤵PID:5976
-
-
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exeTrojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1952 -
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3952
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "N0mFUQoa" /TR "C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" /SC ONLOGON /RL HIGHEST /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3356
-
-
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3100 -
C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe"C:\Users\Admin\AppData\Roaming\Rj3fNWF3.exe" g4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2752
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f252888.vbs"3⤵PID:4704
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exeTrojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1900 -
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exeTrojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe3⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1932
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exeTrojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3052 -
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exe" g3⤵PID:5344
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exeTrojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3044 -
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe"C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "2y3tcrdB" /TR "C:\Users\Admin\AppData\Roaming\DbLrW8nl.exe" /SC ONLOGON /RL HIGHEST /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3468
-
-
C:\Users\Admin\AppData\Roaming\DbLrW8nl.exe"C:\Users\Admin\AppData\Roaming\DbLrW8nl.exe"3⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config252888.bat"3⤵PID:4632
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exeTrojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1084 -
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exeTrojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3728
-
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exeTrojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exeTrojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:1344
-
-
C:\Users\Admin\Desktop\00362\VHO-Trojan-Ransom.Win32.CryFile.gen-9a78b34c50b14d1da2e250fa837fb3afeb767d1fd0e2708dde3dc597fe225456.exeVHO-Trojan-Ransom.Win32.CryFile.gen-9a78b34c50b14d1da2e250fa837fb3afeb767d1fd0e2708dde3dc597fe225456.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 4723⤵
- Program crash
PID:5092
-
-
-
C:\Users\Admin\Desktop\00362\VHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exeVHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1768
-
-
C:\Users\Admin\Desktop\00362\VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exeVHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2176 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru3⤵PID:4340
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:3540
-
C:\Windows\SysWOW64\sonickey.exe"C:\Windows\SysWOW64\sonickey.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1400 -
C:\Windows\SysWOW64\sonickey.exe--fc71f0652⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2364
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2208
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {7007ACC7-3202-11D1-AAD2-00805FC1270E} /I {000214E6-0000-0000-C000-000000000046} /X 0x4011⤵
- System Binary Proxy Execution: Verclsid
PID:3452
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
2File Deletion
2Modify Registry
8System Binary Proxy Execution
1Verclsid
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\AutoRun.exe.exe.id-621036A5.[[email protected]].combo.exe
Filesize9.4MB
MD58965cc483c32c770102ca6ec049593a1
SHA1b8489b27c21a6fca4ba1511a4d619a4e3872664e
SHA25666c280d56ee2b6dc347c8c5c303c4ff19104531864e1b82343750c0d22df4d3b
SHA5127fd92e857bd3f4d0603d7284423ba1d4ab322a4395bfacd538458ea41d6cbf6c73fdf2e52375001ddc452cc85d2fe34d801c18e9183479d1b98d264bf9811f62
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc.exe
Filesize92KB
MD5087b89e9762a8f81d254bfdb879f1f93
SHA177071fbe5f6ed22c388baf10dd957cd6cb5ac223
SHA256253b606a1df715d763023be86ba061e79b17202a4f6c3387b66905f7661210cc
SHA5127d004aad73a24024846be1e063f2fd6a4b8404470fcd0c28b5b07dcf8fc4a642a56c3467be3f67d370c1ccce6fdaad7ed3e93659ed0ee0fe7bf3a6eb29e7b133
-
Filesize
112B
MD572990f914cf7e74c7ce62287d9a408b4
SHA139c932930eb67571840411a07d0e3f1c1c1c1774
SHA256ebd7ebbe6bd10d1d59c9b0eeb0f75f63d21def48053e922e53299b4bc1e4e59e
SHA512143735b67689520369db0475c370a5ea574177223fd7f6ae4e0ee34781897f5bd7bffdd7475bcc8d6169b00ebaff4ea4544e15fc9d1cc962d7e51efc53a0effb
-
Filesize
24KB
MD573d1da91a59b3cb4715e28bfc6cb95e4
SHA145fbd7d45b5a805cfd708bbde0092455de2b657f
SHA256d23dd97fb2b812af621146a912d2cdaccff29e836ba33266d1f81e083ad1c39d
SHA5121cc73b0fb0c8f3f53e039071dfc15e8b5f4e4872f66f1dfb4a37532f48417dfa227564f024ebf472635690f2c284ff0c53c14fe4b9854f0b660be854afa350dd
-
Filesize
11B
MD5fbf2b0ea6fdc6fe3148bd600729d5fac
SHA12c0aad6ae361763eddc2668a9493f434d6a972bd
SHA256c794c993f1d9125029477df973401ae082c56b53f1d7e461258537aa7efc5797
SHA51229547388d261c54a031e97f0beeaf3bba67949a4a178ab5df39091d7e8e8a66415bc1f9dabd518eb7ceb7c01868b124575c7a16e41ed4e180a9df872847e57fb
-
Filesize
326B
MD50f61dd0be9bbc02accac8fc508974e94
SHA1aca48bc2cb56c5367d46c6964667d71edf239e07
SHA256be8f5c16f8776680b6703070fe9aa0d2667705e007405ea2472b546e4780fd29
SHA5126ad8397feff27260be52c651527e32bcbc8c93a9496f3667f3eaead5e510da0a642c41da5b1065362e69ce6d9bb4a6e6ad75593b311438c35391d7f9e5c44f7c
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.MSIL.Blocker.gen-7120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69.exe
Filesize404KB
MD553628c0287e4b0f1374fe6f45fd34613
SHA195327f5f74b20bcb578f74268b3c72bbe523982f
SHA2567120648f241608d4b044725605e17a7cb5212b365e025cb22ec64fc354cbac69
SHA5120af6b83a21d8745b5910677ae58047eb47f34b010bb79b5b169bf4e92e99804c915c0fbc49d35f6f8be209b4f8e404c170dd1df1637bfdd8ec9a7e965c7a550a
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.MSIL.Crusis.gen-8f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd.exe
Filesize593KB
MD55868264665fcba3b9dd57829c6d68ab2
SHA1f882a08222cdc97176a4eb8e53f711cb0b249570
SHA2568f6d43123d4775accaefec86fe48ee3eadefc6b7d6f4cc8e9b1457f11a18f3fd
SHA5128327ffb5053db58160f5171e6accce09208ec8978eea4319d627e9e4f40ad6a6f17e7eeb8d25b445ba061df6c7a2ab0525ef83ab297d46a46fb6236ed1170218
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Crusis.gen-1b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e.exe
Filesize1.6MB
MD59fa2f903430f1c0ca65b91e6e8d6685c
SHA14dfbec323531832996e4d42113699fff4627f678
SHA2561b6e0745f55770f15cef6ba784b277927aee768c1002197cbaae0251c4817b4e
SHA512e74695ab166c9c0b98901b4255a137b5c1d50453e8f8047e088fc1da9cbc8eb821090a3ffec7c484de9b198e2d531a1be6667e6b7baf314670b08c92c59b669d
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Crypmodadv.gen-320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0.exe
Filesize145KB
MD5a254063565c10fa5187b6eba88e42a60
SHA19d914ac395e1f023a4018097c2a76b67bc006169
SHA256320507782c731aef5234987ec1b14d78515ebe8bbe415da98c1232a10cc0c8e0
SHA5124af9ee0f3a11c000f97c34c0ce41f56f4af5ae473f5d234fa786f75c32d3c568e3367a41caa03e3e65c60e44627629da34f512ff83549d0e1310481b115b957e
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Encoder.gen-7b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118.exe
Filesize201KB
MD5d0aaf822e32f1635832bedbe6ea70d26
SHA16c362284c1248b7c5221c5f5a46e4f7f3c72e552
SHA2567b392d62c0cf66f0cdb494c3e9ab8d0d4dda654fab1628d45c510201124d2118
SHA5123d2ed8041d56e16b2c1015c8f4e3c8ff28db2e0ac0eef5688edb5cc92473c79ba6d531daf252c692c314b21716ff5d009119334b6c6f157892d61151e9c4ef2a
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.Generic-ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845.exe
Filesize134KB
MD51b3dcb6a2607302ec418336738eee5d5
SHA18c92920689f035ed36462a171a39c4f4ca82e8e1
SHA256ccdc254a5f222da48a874d90c02ed1b78d9100d15a9d75978adfa839648de845
SHA51273d70ee90e5d02b03ab45493dd73f3f05f99c676a771bdf6ee0f21c543c3c6f0e99fae989b4942ff24ea2a88ce69a733d2713acff4366e5b33443e8857feef8c
-
C:\Users\Admin\Desktop\00362\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651.exe
Filesize1020KB
MD58b9c98fe609bf73966ca30e8ad065761
SHA132f7a490228111acf15e1ebbb1054149647ae1be
SHA256fc48846e615556b8f8dd2a4ea242d906de9a7cb244ae074abcb9956888071651
SHA512a8e771054915e9679d266773a6d30b3eba2d9a5f6c12eec06555acd2565cba9d5479d6fdf294c27c801bc206ca12911f489c800e6aa5a61d9fe2630d29e4d210
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.lcym-299f0c0eb83c24099d59635974b4e26447695ff4dfc43a5d635eb548963e8eb2.exe
Filesize246KB
MD52ac77bfbd7840099dffcc22310260b9d
SHA1a60c2380475aa655a8dbe0226567c4e863d8b28c
SHA256299f0c0eb83c24099d59635974b4e26447695ff4dfc43a5d635eb548963e8eb2
SHA51247b7728f71fa4e627e0b3364c33119268350de1df14e519f454d3d40188d0b31e9548b38b4720e33b52684cc6ba0c9fbae9092a6b424a7d2490d96ba9787ecf0
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.ljpe-73fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400.exe
Filesize982KB
MD5caf50f53d604387e2e7d5f7af078ea5a
SHA108fbbb77be6792eae0baca40fcd13d549a138693
SHA25673fece16bccb22d72e1e27aedabdc2f8168bea1f88b3d24406aecde8caed7400
SHA51243679e574b024f68b89149f23c3a5231c748d8bb67ebad6d6ace811c50db430f5e0fbd533a04d81991033410d146d37b050cafef37be9bcf015c113c3b8395d3
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Blocker.lyyb-24713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44.exe
Filesize16.0MB
MD52f0ee17b69268da326612867a871a87b
SHA1f2aa604da5cd926cf348392628bd28af1d21df79
SHA25624713dba676eb17446c32c41c02f1c2df0c7c0c141a10129ccfef3e83e939a44
SHA512a75775fd33fff5ce28233aced57afff3b8766f63418c2fd1862891fdb356a4d5623200cbb61bdb8b1044e5927ec974d68f9a3b341a08df4cbd204a388ba50cff
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Crypmod.abce-57e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1.exe
Filesize2.1MB
MD56480a243fdef6a65ef30dbdbb6ae0033
SHA1cf00a12174a8e630507a9ffcc2c8ea8b57ffe5dd
SHA25657e84da4e957456c4e8175890ede206164cf6dfd3294e43881a9c8a85e582dd1
SHA5126a414f10b9cb5b4d7b128dca3a5fa371b24118b50359c96d027736cc2cd0f5a04c9041d756fc59bf252b548a243e1bac214aba72cb52d6fb8c0b073b4a94e60c
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Crypmod.absj-d531ab589af63660210359ee898d845cb79d6799c70882932d9f191b2e322f66.exe
Filesize5.5MB
MD5b1956b8d0863317a97f29033be698619
SHA1db9c5d05a3ea68c24cc5180750a173f65347fbff
SHA256d531ab589af63660210359ee898d845cb79d6799c70882932d9f191b2e322f66
SHA512de05a52c22ac4ab95ebfc07a6632a5805c044a1e5635a792343614491a8d9fbb5b8a33b8a6fe22473edc995999d5a26d4a5e8eb6758dba18c874f58f503e6233
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.nysp-1540e3fdbc52ad3de631bf66af69bff0e88c38981a06a74ecab16a2a739e7111.exe
Filesize952KB
MD5e9359ff2e2891ab941dede55fc032db3
SHA16b637c6d601d16402114c08cf258bdec112e89d0
SHA2561540e3fdbc52ad3de631bf66af69bff0e88c38981a06a74ecab16a2a739e7111
SHA5126009265cf152e67dd0eca367afa7eabc7bd3091fb5c39c28fddb6045d9a4092e8db22f6c316a25405b97d426e21ae54bf13ea1036d7ed9a19e8df85d50d168ce
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.nzem-ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72.exe
Filesize654KB
MD5021751c7e2530433f0b34bc830fea06b
SHA132406c55ffd1fb0130fd778292b998f566eeaa9c
SHA256ee4c1750d4e4c543abaa722410e2f3bfb0bdf2bd5b567cd66f36a92ef8e98d72
SHA51272c0628efec2965bd49326c8d333a1456be5dd155f2ae5510741aa04fce404229bc335c69b1af73c6c16e671ac5e09e10a58e6f97e201e3459b94448cf7454a6
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.nzsj-3bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b.exe
Filesize508KB
MD5cd09cbc5069bdd2137f38265d107ff4b
SHA1e6c71fe681277f35d3dd7e32ab072f0e6b9e695a
SHA2563bd623f8c86656ff0e228b650e1a4530954ff4ee787ff59d0f05fa338381695b
SHA5126ef2894e021b3e2ba73b0d49f090a5a0c50cc14cff440b06317ede6f42cf2161863bc89cebb2730a8f07b32b30884041fa8df79000d9d1a182ac1b1acfc37753
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Foreign.zhs-b97827f56e5d80a8ea6d929cbd85c29a45f3fb7ed2da237c819535229ea91f91.exe
Filesize104KB
MD5490c5710d0621b9cdcd76e5d552710ee
SHA1b33257fc4d1fc9905fe17589deec0f12c94c6370
SHA256b97827f56e5d80a8ea6d929cbd85c29a45f3fb7ed2da237c819535229ea91f91
SHA512ce3c1b8c857a830cd1650b7488d1f3cfb6b8cdc685382c1e88631be2c1c77ecf29f6bb793792e94e65f6a66ea4a9fbb4d6ba808afe2844cb8cfe9f50fc088dbf
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Gen.djd-201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9.exe
Filesize232KB
MD58dd63adb68ef053e044a5a2f46e0d2cd
SHA11bc604573ceab106e5a0e9c419ade38739228707
SHA256201f42080e1c989774d05d5b127a8cd4b4781f1956b78df7c01112436c89b2c9
SHA512c7c267b3be9f50783b394ae9ae960d5ff636c63a58c645764712fed28ce9be616344c2a248782da7f50ede465d3f1e8ec7267d62ebc5e86490ad472518ab1526
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.ahg-ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d.exe
Filesize180KB
MD5309cf0161d1170c63657277c1ea038f5
SHA1e13ace1d80c10221a35017e76d9f23642b65f4fe
SHA256ea5a47ff2ae0b0922b70f25944b690e95267fc83043279be2ea895b5cab5410d
SHA51227d12d63d1d99c9631084b2aa09c993ce05b77e14bea145e6672953052190e73058f215aee0ccf1bded8e2050c833082d84a8e5c164be5c7651802509f95960c
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.dfk-fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b.exe
Filesize260KB
MD596eb3ce31d056669fe09fd3d9154eb7a
SHA113f0224b72e785e4880ebe298e26cc4b5d74029e
SHA256fa03a5919f885e26b3147cae493f7981614b83edaca30a11315219d7127bb96b
SHA512f0d77e3e01c707633596da9cc3228f3c1565d14b18f9d1fbb402907628edfc7b6d65c3a50df1f25793024bea8c4ad78e59c05a2bb139dc3008ec3bd55abffd22
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.dqq-9b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339.exe
Filesize310KB
MD578eec6c02ead4ebd7b98f0922b774b04
SHA1d09d6ee509d612acf7648d53a3674ccc28397c26
SHA2569b0682fd7846e7edd3bf6206adb76e94953f7af62243928449af563f95ab9339
SHA512ce15c5b7cd529910a68cffed6ae2dc4a4b924c8e18fcac02c15ed273b2e73a11ea099201e34b8017ba58d62702a3f4a0c8cc33f662da43e87e7d38d0b6935d04
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.eqs-8eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391.exe
Filesize310KB
MD5f1a286d4b5d40d73fc5b8e71b0456df4
SHA175a99d61104ce8d543c5d81c669ba994a458a17e
SHA2568eea329ef17e6b6d21c2b5e8b5f063a5c73e1116787b77bc034232071fe65391
SHA5121d314bb1ea246bf7119ab0efeea52f48d24464589b98170cb749dcfc17b94eb9c0a049ba6a1c09a3e800f71fa27262d22bc5064c5c9a9deddd7341abe83deb29
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.SageCrypt.xx-5ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276.exe
Filesize304KB
MD59dbd0cc92a734cb2f434122ff62f6799
SHA137dff5ab99fea8b6f591e5eb887b48dc647c42cf
SHA2565ffd631d2e652487074b273c7199b1b3e619fb975cbd0ec82c9c9af27f250276
SHA512970d04126d9c0e66b0cc627703831e4d89df03880a942ed994256453372890bd84fe716eda66e16c4a65dcd92ec3ae01c817c998c5d99ee60e828b3942ecf179
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Shade.oaq-556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0.exe
Filesize940KB
MD5c729b5dd77e6dafba527e578aa1c222d
SHA1f3b589aa4553aefa0138bd793d2cb5a0f0bf967d
SHA256556385396b3383b85bc2e2e9fdf1c3bc8801d4665aae745b0120a4ac4d95aaa0
SHA5125b7e318ea2203e56ff5b4d4ab9023813be76602a6d739563b5b6cab7ff487145c8bc075799b34971471891651debbcb00f8bf3ef2a67b841ee586b01b9f7c382
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Shade.owu-bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3.exe
Filesize1.8MB
MD575bc7d9b78399b6c9ac56ee24e57ccad
SHA1b6a270e792172401c1148168c80f0d8b99c5a360
SHA256bb6f856ad48b43e231364df2fcc37ec2a115335f4a0d6e9968b709ce163d13f3
SHA5122148851c91bfc656f28fc5e8f59fef2f09cd490d0016f92739943e3ab0de07a5c0103cf9258aeab2691da2d1127e21fe3080be4d4942267360b0fc86ceb29f10
-
C:\Users\Admin\Desktop\00362\Trojan-Ransom.Win32.Shade.pum-fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de.exe
Filesize1.4MB
MD5201e80d06b45399649f453017eb5a4e5
SHA1a568a885dc5898444c8169630a37eaecc2f28fcd
SHA256fb814be5ad2692c8c833d98abf8d15345b95d09a95ac5abfc6d758c9786fe4de
SHA5122742ac087033f817d148f13df4acaacf63527d2af5de66e0d946af4ecb2b277d3769c6c5d3c90cf93bf0610a0905b7519c1c7f81f59ccee79f865c13e15d5fd0
-
C:\Users\Admin\Desktop\00362\VHO-Trojan-Ransom.Win32.CryFile.gen-9a78b34c50b14d1da2e250fa837fb3afeb767d1fd0e2708dde3dc597fe225456.exe
Filesize142KB
MD5b6afc91d467bbb2b2f5afb2404082a31
SHA1936ba58ce06876ef9f5ce1fa845ced27483cb2f9
SHA2569a78b34c50b14d1da2e250fa837fb3afeb767d1fd0e2708dde3dc597fe225456
SHA512ec74da706623cbea70266517718c033c01cec317f9e1eb8f9b951c4ed849c13237c80560691bb89da36dfd00f1b5491e45947eb4aaa3ce9e0bd24d77de2eb695
-
C:\Users\Admin\Desktop\00362\VHO-Trojan-Ransom.Win32.Crypmodadv.gen-b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f.exe
Filesize5.6MB
MD570c9b9207a18a13a4dc5fe0b988acc0a
SHA1d69ffd15fd256b9ed10f80b3138680b9517859fa
SHA256b4fd9c26812533a547a864fb82fe60ddf821f98e1eb57e0dd90fa9278b884a2f
SHA512f90b09657aecf873e73c248201e26a27ff1242ba8568d44f9f949ac8035867da1dce4c2532ed840b4252fafbdf1c06281d9351c8e3da066c3c2d51d44453b8d7
-
C:\Users\Admin\Desktop\00362\VHO-Trojan-Ransom.Win32.GandCrypt.gen-a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e.exe
Filesize97KB
MD51c18720372b8130341967a7d9b311b0b
SHA1bb10671fc6862b4cf1c3c8be2de9aadfcb2563c0
SHA256a5a9138278c0357d815d9ef46cfe1b239083db73c9be5075068c69355cb84f2e
SHA512108df2720a666c688d02bb9818ce96bfa0aa8eb1f639744e604c6e394ab49015e403beeb33cbc5bca3be1813c9c5dd6c6bacad29218e4bfc44c5325ae0b7f10d
-
Filesize
91KB
MD524c06d6bd066b8334e4427238ab834ad
SHA13307cea13bb1ccb941e133261a579027b9d94dcb
SHA256261ef2913f561073ad74106fc53937da07bd914f5768032fe96d0108db7d7e4c
SHA5121c3f506029543fc152c7ef88845862ade40507f8525d3086fb7f40de4e999f7da827ed3a81e1364a344736a0b8a83503ab63cee39aa4aa76d47750c00684df24
-
Filesize
196KB
MD5bd2b8998c979492a37cc3f159942f980
SHA1e86ded8b245e3d730a6b01f76f998d79fb1e5dca
SHA256ffa0baef91cf6a1b9497d04d85b655bef807bebe804003bf7c2cafada4329bac
SHA512035aa54045a7b4d6048af1d6d0dc7a6930afc00e45870c02601b383aafbe3ea5ae4275bbfb77c8aab813e594cb28def8a9d3d6c1caa98c92ec0a0ed9d031e575
-
Filesize
640B
MD55d142e7978321fde49abd9a068b64d97
SHA170020fcf7f3d6dafb6c8cd7a55395196a487bef4
SHA256fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061
SHA5122351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9
-
Filesize
1KB
MD530830cd1e9102c307fa1d96eef7e8b3b
SHA1b8a6abb2152362b5309af83f13e70d2919b5f2ae
SHA2568c320f01086168c873b24ae707636fca305fc9bfe8c64ee9a0704c52d79d07f9
SHA5129cd7eeb764cb5f5c88a1b533a88aa9ae758ed9076a07d382557b0739febb8bbc49fb9cfe4c25d5b55f028b1258cbb7cc7799c2d84ef8765d7217af6435244d6c
-
Filesize
217B
MD5c00d8433fe598abff197e690231531e0
SHA14f6b87a4327ff5343e9e87275d505b9f145a7e42
SHA25652fb776a91b260bf196016ecb195550cdd9084058fe7b4dd3fe2d4fda1b6470e
SHA512a71523ec2bd711e381a37baabd89517dff6c6530a435f4382b7f4056f98aff5d6014e85ce3b79bd1f02fdd6adc925cd3fc051752c1069e9eb511a465cd9908e1
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a