Analysis
-
max time kernel
362s -
max time network
363s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00367.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00367.7z
-
Size
22.7MB
-
MD5
8ee12d4c434d7584881c61eca64b6b58
-
SHA1
04a7f16dd939f2c275059cd0678de82bb5c5d3a9
-
SHA256
191e22ebc970d41dd9dfae0d33555bbd6328b03ec5e7dcf047b3020ca31b9ade
-
SHA512
b076c35d5a418fe4f2f57c012d3ff5a459fc17e142e62901b2206e3a051b857ea40112b745f5e7f5a486a26cd5b2f8abb8a3642523d4819e7b6b242de6151d69
-
SSDEEP
393216:Srag8u6vHum94V9qliWOtHl1hwToU526fO7nZfiOFH1PvvpPo3ocS+lQieqqMDQO:jgx6P/TiW0F1dm26fIRRH1HhwYR+telO
Malware Config
Extracted
emotet
Epoch2
81.109.227.123:80
82.15.36.209:443
142.4.198.249:7080
162.144.119.216:8080
142.93.88.16:443
31.12.67.62:7080
91.83.93.103:7080
178.152.78.149:20
104.131.208.175:8080
136.243.177.26:8080
206.189.98.125:8080
178.79.161.166:443
195.242.117.231:8080
187.163.222.244:465
186.144.64.31:53
104.236.99.225:8080
71.244.60.230:8080
91.205.215.66:8080
212.71.234.16:8080
190.25.255.98:443
69.45.19.145:8080
188.166.253.46:8080
91.74.62.86:8090
167.114.210.191:8080
186.4.234.27:443
190.53.135.159:21
222.214.218.136:4143
80.1.76.46:20
182.176.132.213:8090
94.76.200.114:8080
87.230.19.21:8080
178.62.37.188:443
31.172.240.91:8080
200.85.46.122:80
159.65.25.128:8080
190.145.67.134:8090
187.163.180.243:22
86.139.40.19:8080
60.48.253.12:20
78.24.219.147:8080
187.146.179.75:993
81.110.245.131:80
47.41.213.2:22
90.207.51.77:80
181.129.30.82:80
45.123.3.54:443
190.72.136.214:465
46.101.142.115:8080
84.241.10.111:53
182.176.94.236:20
190.25.255.98:80
187.189.195.208:8443
120.150.236.64:20
147.135.210.39:8080
186.31.189.232:143
138.201.140.110:8080
190.128.26.2:80
169.239.182.217:8080
95.128.43.213:8080
179.14.2.75:80
190.25.255.98:143
87.106.136.232:8080
77.56.253.112:80
179.14.2.75:21
144.139.247.220:80
217.13.106.160:7080
125.99.106.226:80
50.31.0.160:8080
41.220.119.246:80
186.19.202.88:21
190.97.219.241:80
39.61.34.254:7080
85.104.59.244:20
174.136.14.100:8080
222.214.218.192:8080
201.199.89.223:8443
62.75.187.192:8080
59.103.164.174:80
66.84.11.168:8080
175.100.138.82:22
187.225.213.90:20
182.176.94.236:21
24.139.205.186:8080
201.238.152.20:465
189.209.217.49:80
177.246.193.139:20
104.236.246.93:8080
92.154.101.154:50000
216.98.148.156:8080
78.186.5.109:443
50.99.132.7:465
104.131.11.150:8080
211.63.71.72:8080
177.242.214.30:80
87.106.139.101:8080
78.188.7.213:8090
64.13.225.150:8080
119.155.153.14:21
211.248.17.209:443
201.220.152.101:80
213.14.166.152:990
117.218.17.6:990
173.212.203.26:8080
186.4.167.166:80
46.105.131.87:80
45.33.49.124:443
179.32.19.219:22
162.243.125.212:8080
182.176.94.236:80
75.127.14.170:8080
181.189.213.231:465
Extracted
sodinokibi
20
46
aberdeenartwalk.org
happycatering.de
amyandzac.com
livedeveloper.com
alexwenzel.de
trainiumacademy.com
nuohous.com
epsondriversforwindows.com
slideevents.be
skooppi.fi
golfclublandgoednieuwkerk.nl
santastoy.store
mieleshopping.it
innovationgames-brabant.nl
ideamode.com
internalresults.com
mondolandscapes.com
axisoflove.org:443
adaduga.info
jlwilsonbooks.com
teutoradio.de
nationnewsroom.com
cuadc.org
justaroundthecornerpetsit.com
corporacionrr.com
masecologicos.com
m2graph.fr
marcandy.com
newonestop.com
nourella.com
agenceassemble.fr
schroederschoembs.com
volta.plus
galatee-couture.com
fascaonline.com
sveneulberg.de
rtc24.com
kafkacare.com
secrets-clubs.co.uk
line-x.co.uk
designimage.ae
encounter-p.net
happylublog.wordpress.com
grancanariaregional.com
mariannelemenestrel.com
qandmmusiccenter.com
hvitfeldt.dk
bumbipdeco.site
bd2fly.com
switch-made.com
thiagoperez.com
csaballoons.com
testitjavertailut.net
outstandingminialbums.com
innersurrection.com
alltagsrassismus-entknoten.de
placermonticello.com
makingmillionaires.net
cxcompany.com
hnkns.com
bodymindchallenger.com
grafikstudio-visuell.de
brinkdoepke.eu
craftingalegacy.com
kvetymichalovce.sk
letterscan.de
rhino-storage.co.uk
cap29010.it
tecleados.com
weddingceremonieswithtim.com
o90.dk
endstarvation.com
dinedrinkdetroit.com
vdolg24.online
bescomedical.de
triplettagaite.fr
90nguyentuan.com
patassociation.com
bychowo.pl
g2mediainc.com
speiserei-hannover.de
livelai.com
innervisions-id.com
leadforensics.com
xn--80abehgab4ak0ddz.xn--p1ai
latteswithleslie.com
globalskills.pt
factorywizuk.com
qrs-international.com
shortsalemap.com
qwikcoach.com
frameshift.it
tutvracks.com
kompresory-opravy.com
scotlandsroute66.co.uk
hensleymarketing.com
phoenixcrane.com
spirello.nl
mangimirossana.it
akwaba-safaris.com
watchsale.biz
acumenconsultingcompany.com
fysiotherapierijnmond.nl
specialtyhomeservicesllc.com
diverfiestas.com.es
myfbateam.com
mariamalmahdi.com
parksideseniorliving.net
selected-minds.de
zealcon.ae
plbinsurance.com
peppergreenfarmcatering.com.au
thestudio.academy
charlesfrancis.photos
speakaudible.com
smartspeak.com
xn--billigafrgpatroner-stb.se
ceocenters.com
bayshoreelite.com
annida.it
atrgroup.it
k-v-f.de
curtsdiscountguns.com
espaciopolitica.com
gazelle-du-web.com
hostaletdelsindians.es
mesajjongeren.nl
nykfdyrehospital.dk
k-zubki.ru
agriturismocastagneto.it
gatlinburgcottage.com
business-basic.de
haus-landliebe.de
bakingismyyoga.com
stabilisateur.fr
loysonbryan.com
xn--80addfr4ahr.dp.ua
c-sprop.com
harleystreetspineclinic.com
ketomealprep.academy
domilivefurniture.com
kausette.com
mazzaropi.com.br
jobscore.com
bodet150ans.com
hoteltantra.com
saberconcrete.com
thegrinningmanmusical.com
onlinemarketingsurgery.co.uk
successcolony.com.ng
advesa.com
fskhjalmar.se
toranjtuition.org
mind2muscle.nl
terraflair.de
alaskaremote.com
memphishealthandwellness.com
sealgrinderpt.com
crestgood.com
pxsrl.it
so-sage.fr
circlecitydj.com
domaine-des-pothiers.com
condormobile.fr
aoyama.ac
muller.nl
adedesign.com
goodherbalhealth.com
ddmgen.com
frimec-international.es
imajyuku-sozoku.com
bulyginnikitav.000webhostapp.com
metcalfe.ca
dentalcircle.com
primemarineengineering.com
rivermusic.nl
airvapourbarrier.com
scietech.academy
uncensoredhentaigif.com
ziliak.com
lovetzuchia.com
turing.academy
fluzfluzrewards.com
irizar.com
holocine.de
hutchstyle.co.uk
ramirezprono.com
fta-media.com
awag-blog.de
elex.is
rino-gmbh.com
motocrosshideout.com
reputation-medical.online
the-cupboard.co.uk
dennisverschuur.com
saboboxtel.uk
denhaagfoodie.nl
lyricalduniya.com
lovcase.com
creohn.de
egpu.fr
pro-gamer.pl
acibademmobil.com.tr
eafx.pro
awaitspain.com
limounie.com
drvoip.com
energosbit-rp.ru
nieuwsindeklas.be
witraz.pl
thesilkroadny.com
baita.ac
entdoctor-durban.com
kryptos72.com
bruut.online
hospitalitytrainingsolutions.co.uk
sppdstats.com
drbenveniste.com
enews-qca.com
mikegoodfellow.co.uk
from02pro.com
sochi-okna23.ru
p-ride.live
centuryvisionglobal.com
liepertgrafikweb.at
fire-space.com
dibli.store
parentsandkids.com
eos-horlogerie.com
rentingwell.com
finnergo.eu
simpleitsolutions.ch
louiedager.com
letsstopsmoking.co.uk
onlinetvgroup.com
customroasts.com
lidkopingsnytt.nu
hotelturbo.de
aheadloftladders.co.uk
bratek-immobilien.de
itheroes.dk
go.labibini.ch
leloupblanc.gr
zdrowieszczecin.pl
luvbec.com
trivselsguide.dk
fanuli.com.au
yuanshenghotel.com
sweetz.fr
theintellect.edu.pk
drbrianhweeks.com
geoweb.software
signamedia.de
guohedd.com
jayfurnitureco.com
peninggibadan.co.id
jax-interim-and-projectmanagement.com
bluelakevision.com
sololibrerie.it
khtrx.com
acb-gruppe.ch
arearugcleaningnyc.com
ruggestar.ch
malzomattalar.com
noda.com.ua
lookandseen.com
imagine-entertainment.com
tanatek.com
jimprattmediations.com
lollachiro.com
topautoinsurers.net
boyfriendsgoal.site
pixelhealth.net
yayasanprimaunggul.org
richardiv.com
yourhappyevents.fr
ocduiblog.com
kellengatton.com
cmeow.com
neonodi.be
5thactors.com
polynine.com
directique.com
eatyoveges.com
nicksrock.com
licensed-public-adjuster.com
perfectgrin.com
stressreliefadvice.com
juergenblaetz.de
clinic-beethovenstrasse-ag.ch
mediabolmong.com
sachainchiuk.com
evsynthacademy.org
bavovrienden.nl
log-barn.co.uk
pisofare.co
billigeflybilletter.dk
min-virksomhed.dk
rentsportsequip.com
forumsittard.nl
palmecophilippines.com
reygroup.pt
ya-elka.ru
mursall.de
janellrardon.com
penumbuhrambutkeiskei.com
nvisionsigns.com
look.academy
blavait.fr
pinthelook.com
spacebel.be
buerocenter-butzbach-werbemittel.de
astrographic.com
projektparkiet.pl
rolleepollee.com
aslog.fr
deduktia.fi
sarahspics.co.uk
schlagbohrmaschinetests.com
beauty-traveller.com
vapiano.fr
suitesartemis.gr
rs-danmark.dk
atelierkomon.com
apmollerpension.com
martinipstudios.com
kuriero.pro
strauchs-wanderlust.info
n-newmedia.de
devplus.be
mariajosediazdemera.com
koncept-m.ru
magnetvisual.com
theater-lueneburg.de
lagschools.ng
avis.mantova.it
cac2040.com
catalyseurdetransformation.com
sambaglow.com
pays-saint-flour.fr
thegetawaycollective.com
reizenmetkinderen.be
paardcentraal.nl
gbk-tp1.de
tzn.nu
photographycreativity.co.uk
pinkxgayvideoawards.com
nexstagefinancial.com
jefersonalessandro.com
spartamovers.com
craftron.com
bg.szczecin.pl
phukienbepthanhdat.com
limmortelyouth.com
patriotcleaning.net
solutionshosting.co.uk
davedavisphotos.com
the-beauty-guides.com
liverpoolabudhabi.ae
bridalcave.com
vitormmcosta.com
delegationhub.com
radishallgood.com
die-immo-agentur.de
cmascd.com
pokemonturkiye.com
theboardroomafrica.com
explora.nl
tetameble.pl
housesofwa.com
adabible.org
mediahub.co.nz
rossomattonecase.it
skinkeeper.li
framemyballs.com
epicjapanart.com
nxtstg.org
pvandambv.nl
veggienessa.com
glende-pflanzenparadies.de
matthieupetel.fr
cookinn.nl
kartuindonesia.com
poems-for-the-soul.ch
rvside.com
artvark.nl
beandrivingschool.com.au
universelle.fr
campusce.com
pajagus.fr
mayprogulka.ru
magrinya.net
kosten-vochtbestrijding.be
manzel.tn
animalfood-online.de
mindsparkescape.com
bajova.sk
nevadaruralhousingstudies.org
leijstrom.com
putzen-reinigen.com
thehovecounsellingpractice.co.uk
finsahome.co.uk
enactusnhlstenden.com
matteoruzzaofficial.com
purepreprod4.com
schluesseldienste-hannover.de
angeleyezstripclub.com
riffenmattgarage.ch
larchwoodmarketing.com
baikalflot.ru
ledyoucan.com
1deals.com
saint-malo-developpement.fr
ikadomus.com
heimdalbygg.no
krishnabrawijaya.com
dr-vita.de
sycamoregreenapts.com
campusescalade.com
fazagostar.co
kdbrh.com
ced-elec.com
uci-france.fr
apogeeconseils.fr
tramadolhealth.com
alcye.com
kemtron.fr
ufovidmag.com
stoneridgemontessori.com
mrcar.nl
heuvelland-oaze.nl
alharsunindo.com
goodboyscustom.com
brighthillgroup.com
sellthewrightway.com
andreaskildegaard.dk
ilveshistoria.com
zinnystar.com
hostastay.com
legundschiess.de
tages-geldvergleich.de
b3b.ch
klapanvent.ru
gavelmasters.com
grupoexin10.com
agencewho-aixenprovence.fr
johnkoen.com
therapybusinessacademy.com
protoplay.ca
parseport.com
ronielyn.com
narca.net
nepal-pictures.com
affligemsehondenschool.be
gratiocafeblog.wordpress.com
o2o-academy.com
zorgboerderijravensbosch.nl
druktemakersheerenveen.nl
bjornvanvulpen.nl
johnstonmingmanning.com
mahikuchen.com
hekecrm.com
mike.matthies.de
fitnessblenderstory.com
birthplacemag.com
opticahubertruiz.com
ikzoekgod.be
karelinjames.com
photonag.com
mercadodelrio.com
haard-totaal.nl
georgemuncey.com
the5thquestion.com
gurutechnologies.net
nrgvalue.com
stagefxinc.com
maryairbnb.wordpress.com
valiant-voice.com
azerbaycanas.com
dreamvoiceclub.org
eurethicsport.eu
smarttourism.academy
kroophold-sjaelland.dk
datatri.be
leopoldineroux.com
jobstomoveamerica.org
kryddersnapsen.dk
eventosvirtualesexitosos.com
christopherhannan.com
lesyeuxbleus.net
margaretmcshane.com
hiddensee-buhne11.de
billscars.net
edvestors.org
thenalpa.com
natturestaurante.com.br
rechtenplicht.be
mslp.org
otpusk.zp.ua
fridakids.com
soncini.ch
cc-experts.de
triplettabordeaux.fr
cl0nazepamblog.com
pureelements.nl
welovecustomers.fr
karmeliterviertel.com
husetsanitas.dk
advance-refle.com
dmlcpa.com
block-optic.com
werkzeugtrolley.net
oscommunity.de
ayudaespiritualtamara.com
miscbo.it
pharmeko-group.com
9nar.com
blucamp.com
worldproskitour.com
elitkeramika-shop.com.ua
paprikapod.com
bmw-i-pure-impulse.com
jandhpest.com
forextimes.ru
easydental.ae
hypogenforensic.com
oportowebdesign.com
scholarquotes.com
teethinadaydentalimplants.com
ygallerysalonsoho.com:443
zuerich-umzug.ch
rubyaudiology.com
monstarrsoccer.com
skyscanner.ro
agrifarm.dk
boomerslivinglively.com
landgoedspica.nl
amelielecompte.wordpress.com
ebible.co
bellesiniacademy.org
activeterroristwarningcompany.com
xrresources.com
carolynfriedlander.com
jdscenter.com
bonitabeachassociation.com
pourlabretagne.bzh
sber-biznes.com
bringmehope.org
chris-anne.com
markseymourphotography.co.uk
smartercashsystem.com
dogsunlimitedguide.com
topvijesti.net
molinum.pt
lifeinbreaths.com
blueridgeheritage.com
hm-com.com
ncn.nl
lumturo.academy
operativadigital.com
cesep2019.com
chatberlin.de
eyedoctordallas.com
jakubrybak.com
julielusktherapy.com
orchardbrickwork.com
jalkapuu.net
eastgrinsteadwingchun.com
theatre-embellie.fr
mjk.digital
ijsselbeton.nl
circuit-diagramz.com
bourchier.org
tesisatonarim.com
loparnille.se
physio-lang.de
metallbau-hartmann.eu
christianscholz.de
wineandgo.hu
cops4causes.org
craftstone.co.nz
agendatwentytwenty.com
opt4cdi.com
relevantonline.eu
oraweb.net
silverbird.dk
angelsmirrorus.com
aktivfriskcenter.se
piestar.com
onesynergyinternational.com
muni.pe
dcc-eu.com
fann.ru
greenrider.nl
goddardleadership.org
racefietsenblog.nl
jeanmonti.com
trevi-vl.ru
redpebblephotography.com
comoserescritor.com
solidhosting.nl
mrkluttz.com
laaisterplakky.nl
morgansconsult.com
alnectus.com
ravage-webzine.nl
111firstdelray.com
foerderverein-vatterschule.de
nalliasmali.net
fidelitytitleoregon.com
logosindustries.com
jlgraphisme.fr
palema.gr
slotspinner.com
advanced-removals.co.uk
victorvictoria.com
collegetennis.info
boloria.de
levencovka.ru
cincinnatiphotocompany.org
chomiksy.net
globalcompliancenews.com
medicalsupportco.com
descargandoprogramas.com
utilisacteur.fr
dantreranch.com
electricianul.com
gaearoyals.com
linkbuilding.life
xtensifi.com
mustangmarketinggroup.com
glennverschueren.be
bluetenreich-brilon.de
cainlaw-okc.com
buonabitare.com
renehartman.nl
breathebettertolivebetter.com
chorusconsulting.net
subquercy.fr
cp-bap.de
unislaw-narty.pl
cyberpromote.de
geitoniatonaggelon.gr
fi-institutionalfunds.com
zwemofficial.nl
dentourage.com
rozmata.com
wribrazil.com
mediogiro.com.ar
anchelor.com
hartofurniture.com
fixx-repair.com
xn--ziinoapte-6ld.ro
stringnosis.academy
hinotruckwreckers.com.au
gsconcretecoatings.com
proffteplo.com
funworx.de
bundan.com
computer-place.de
mneti.ru
azloans.com
leansupremegarcinia.net
biblica.com
unboxtherapy.site
girlish.ae
duthler.nl
advancedeyecare.com
breakluckrecords.com
agora-collectivites.com
galaniuklaw.com
deziplan.ru
bagaholics.in
tweedekansenloket.nl
tchernia-conseil.fr
auberives-sur-vareze.fr
taulunkartano.fi
malevannye.ru
direitapernambuco.com
afbudsrejserallinclusive.dk
bohrlochversicherung.info
abulanov.com
factoriareloj.com
rhino-turf.com
profiz.com
charlottelhanna.com
tellthebell.website
verbouwingsdouche.nl
berdonllp.com
skyboundnutrition.co.uk
efficiencyconsulting.es
lassocrm.com
stitch-n-bitch.com
olry-cloisons.fr
thepixelfairy.com
chinowarehousespace.com
graygreenbiomedservices.com
avisioninthedesert.com
skidpiping.de
eshop.design
hawthornsretirement.co.uk
martha-frets-ceramics.nl
tatyanakopieva.ru
mgimalta.com
sshomme.com
sunsolutions.es
stage-infirmier.fr
lapponiasafaris.com
richardkershawwines.co.za
janmorgenstern.com
naukaip.ru
2020hindsight.info
wallflowersandrakes.com
test-teleachat.fr
babysitting-hk.helpergo.co
lattalvor.com
kerstliedjeszingen.nl
molade.nl
asiaartgallery.jp
andrealuchesi.it
nginx.com
ilovefullcircle.com
traitware.com
awaisghauri.com
voetbalhoogeveen.nl
mamajenedesigns.com
citiscapes-art.com
latableacrepes-meaux.fr
prometeyagro.com.ua
singletonfinancial.com
burg-zelem.de
envomask.com
wademurray.com
keuken-prijs.nl
furland.ru
vedsegaard.dk
dentallabor-luenen.de
arabianmice.com
annenymus.com
silkeight.com
michal-s.co.il
omegamarbella.com
renderbox.ch
ncjc.ca
parisschool.ru
pansionatblago.ru
claudiakilian.de
groovedealers.ru
kenmccallum.com
aquacheck.co.za
skoczynski.eu
a-zpaperwork.eu
production-stills.co.uk
alene.co
autoteamlast.de
billyoart.com
hameghlim.com
spectamarketingdigital.com.br
albcleaner.fr
ivancacu.com
cascinarosa33.it
tilldeeke.de
drnelsonpediatrics.com
netadultere.fr
janasfokus.com
brisbaneosteopathic.com.au
pubcon.com
jonnyhooley.com
oththukaruva.com
sytzedevries.com
salonlamar.nl
citydogslife.com
achetrabalhos.com
keyboardjournal.com
eksperdanismanlik.com
four-ways.com
dayenne-styling.nl
internestdigital.com
zaczytana.com
osn.ro
iactechnologies.net
cotton-avenue.co.il
goeppinger-teppichreinigung.de
prodentalblue.com
biodentify.ai
katherinealy.com
hotjapaneselesbian.com
raeoflightmusic.com
web865.com
studionumerik.fr
marmarabasin.com
alattekniksipil.com
subyard.com
denverwynkoopdentist.com
johnsonweekly.com
pankiss.ru
lexced.com
etgdogz.de
yournextshoes.com
almamidwifery.com
schulz-moelln.de
stanleyqualitysystems.com
anleggsregisteret.no
brunoimmobilier.com
modamarfil.com
chainofhopeeurope.eu
ahgarage.com
laylavalentine.com
ninjaki.com
walterman.es
wirmuessenreden.com
hom-frisor.dk
brannbornfastigheter.se
arazi.eus
linearete.com
buzzneakers.com
pazarspor.org.tr
greeneyetattoo.com
whoopingcrane.com
daveystownhouse.com
expohomes.com
wasnederland.nl
texanscan.org
oexebusiness.com
brownswoodblog.com
suonenjoen.fi
istantidigitali.com
gta-jjb.fr
devus.de
cssp-mediation.org
sharonalbrightdds.com
rizplakatjaya.com
nauticmarine.dk
aceroprime.com
artcase.pl
soundseeing.net
iexpert99.com
coachpreneuracademy.com
der-stempelking.de
gosouldeep.com
cleanroomequipment.ie
startuplive.org
humanviruses.org
rishigangoly.com
dieetuniversiteit.nl
elliemaccreative.wordpress.com
belofloripa.be
hostingbangladesh.net
richardmaybury.co.uk
t3brothers.com
michaelfiegel.com
mensemetgesigte.co.za
ox-home.com
precisetemp.com
interlinkone.com
catering.com
arthakapitalforvaltning.dk
adterium.com
rokthetalk.com
teamsegeln.ch
jglconsultancy.com
frankgoll.com
aciscomputers.com
vvego.com
myplaywin3.com
alwaysdc.com
futurenetworking.com
levelseven.be
napisat-pismo-gubernatoru.ru:443
jmmartinezilustrador.com
baptistdistinctives.org
unexplored.gr
nutriwell.com.sg
belinda.af
luvinsburger.fr
maxcube24.com.ua
premier-iowa.com
yourcosmicbeing.com
aidanpublishing.co.uk
tradenavigator.ch
hepishopping.com
slotenmakerszwijndrecht.nl
alabamaroofingllc.com
docarefoundation.org
redctei.co
lunoluno.com
leatherjees.com
vitoriaecoturismo.com.br
rattanwarehouse.co.uk
transifer.fr
bertbutter.nl
3daywebs.com
ykobbqchicken.ca
thisprettyhair.com
diakonie-weitramsdorf-sesslach.de
bubbalucious.com
endlessrealms.net
lsngroupe.com
ludoil.it
greatofficespaces.net
edrickennedymacfoy.com
the3-week-diet.net
askstaffing.com
barbaramcfadyenjewelry.com
fbmagazine.ru
imaginekithomes.co.nz
forskolinslimeffect.net
focuskontur.com
mindfuelers.com
mundo-pieces-auto.fr
altocontatto.net
allinonecampaign.com
indiebizadvocates.org
omnicademy.com
rename.kz
site.markkit.com.br
apiarista.de
techybash.com
stralsund-ansichten.de
fotoeditores.com
profibersan.com
ntinasfiloxenia.gr
dnqa.co.uk
wyreforest.net
hawaiisteelbuilding.com
fsbforsale.com
lmmont.sk
wordpress.idium.no
nepressurecleaning.com
inewsstar.com
gardenpartner.pl
dinecorp.com
augen-praxisklinik-rostock.de
towelroot.co
banksrl.co.za
sjtpo.org
concontactodirecto.com
bcabattoirs.org
bcmets.info
insane.agency
broccolisoep.nl
campinglaforetdetesse.com
tothebackofthemoon.com
pilotgreen.com
casinodepositors.com
rarefoods.ro
mrmac.com
premiumweb.com.ua:443
ciga-france.fr
perceptdecor.com
angelika-schwarz.com
amco.net.au
carsten.sparen-it.de
bilius.dk
antesacademy.it
fotoslubna.com
bookingwheel.com
invela.dk
yvesdoin-aquarelles.fr
jobkiwi.com.ng
paradigmlandscape.com
palmenhaus-erfurt.de
floweringsun.org
colored-shelves.com
scentedlair.com
chatterchatterchatter.com
springfieldplumbermo.com
baumfinancialservices.com
ultimatelifesource.com
basindentistry.com
professionetata.com
quitescorting.com
kombi-dress.com
ingresosextras.online
alisodentalcare.com
avtoboss163.ru:443
glas-kuck.de
webforsites.com
lisa-poncon.fr
altitudeboise.com
jag.me
catchup-mag.com
metriplica.academy
ownidentity.com
tieronechic.com
initconf.com
auto-opel.ro
tastevirginia.com
betterce.com
moira-cristescu.com
voice2biz.com
queertube.net
sprintcoach.com
neolaiamedispa.com
wg-heiligenstadt.de
smartmind.net
zumrutkuyutemel.com
dierenambulancealkmaar.nl
global-migrate.com
shrinkingplanet.com
kelsigordon.com
shortysspices.com
animation-pro.co.uk
fla.se
jacquesgarcianoto.com
jollity.hu
andermattswisswatches.ch
atma.nl
kristianboennelykke.dk
cormanmarketing.com
mac-computer-support-hamburg.de
bendel-partner.de
jaaphoekzema.nl
sbit.ag
benchbiz.com
wrinstitute.org
kiraribeaute-nani.com
publicompserver.de
buffdaddyblog.com
motocrossplace.co.uk
donau-guides.eu
kickittickets.com
rapid5kloan.org
satoblog.org
banukumbak.com
bluemarinefoundation.com
acornishstudio.co.uk
amorbellezaysalud.com
oncarrot.com
cardsandloyalty.com
supercarhire.co.uk
metroton.ru
cymru.futbol
mollymccarthydesign.com
mbuildinghomes.com
triavlete.com
airserviceunlimited.com
flossmoordental.com
vipcarrental.ae
littlesaints.academy
mazift.dk
smartworkplaza.com
lgiwines.com
clemenfoto.dk
rsidesigns.com
signededenroth.dk
11.in.ua
oro.ae
digitale-elite.de
midwestschool.org
kookooo.com
lashandbrowenvy.com
jameswilliamspainting.com
biketruck.de
ronaldhendriks.nl
randyabrown.com
tbalp.co.uk
promus.ca
nbva.co.uk
optigas.com
alpesiberie.com
powershell.su
distrifresh.com
stathmoulis.gr
handyman-silkeborg.dk
kamin-somnium.de
akcadagofis.com
iron-mine.ru
5pointpt.com
liveyourheartout.co
skolaprome.eu
pedmanson.com
carmel-york.com
-
net
true
-
pid
20
-
prc
sqlservr.exe
mysql.exe
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
46
Extracted
warzonerat
maine007.hopto.org:5200
Extracted
C:\$Recycle.Bin\WAVZI-DECRYPT.txt
http://gandcrabmfe6mnef.onion/9bb33c11cab9f1c5
Extracted
gozi
Extracted
gozi
1000
vachiderk.com
siberponis.com
-
exe_type
worker
-
server_id
12
Extracted
C:\Users\VEONJCZU-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/9bb33c11cab9f1c5
Extracted
C:\Users\3159sb8nje-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/E34383FCCAB9F1C5
http://decryptor.top/E34383FCCAB9F1C5
Extracted
C:\Users\Default\Downloads\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Emotet family
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/2124-122-0x0000000000270000-0x0000000000E16000-memory.dmp family_gandcrab behavioral1/memory/2468-2181-0x0000000000400000-0x000000000044D000-memory.dmp family_gandcrab behavioral1/memory/2468-2382-0x0000000000600000-0x0000000000617000-memory.dmp family_gandcrab behavioral1/memory/8348-25407-0x000000000F8B0000-0x000000000F8CB000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Gozi family
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Kronos family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe -
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe -
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Sodinokibi/Revil sample 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023c98-191.dat family_sodinokobi -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Contacts a large (7834) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe -
Renames multiple (10282) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (203) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (331) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (513) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (604) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/memory/4832-4296-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/4832-4294-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/4832-8719-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe -
resource yara_rule behavioral1/files/0x0007000000023cee-194.dat aspack_v212_v242 behavioral1/files/0x0007000000023c9f-224.dat aspack_v212_v242 behavioral1/files/0x0007000000023d08-2344.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 5 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation istripper.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation service_update.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Gen.gen-e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation y_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation browser.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 20 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\trojan-ransom.win32.crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\WAVZI-DECRYPT.txt Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\WAVZI-DECRYPT.txt Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\VEONJCZU-MANUAL.txt.fun drpbx.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\cab9f628cab9f1c83f.lock Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\soft.lnk.id-cab9f1c5.[[email protected]].bip taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\info.hta taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\VEONJCZU-MANUAL.txt Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\cab9f628cab9f1c83f.lock Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\VEONJCZU-MANUAL.txt drpbx.exe -
Executes dropped EXE 64 IoCs
pid Process 1588 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe 2804 HEUR-Trojan-Ransom.MSIL.Gen.gen-e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b.exe 2124 HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe 2140 HEUR-Trojan-Ransom.Win32.Convagent.gen-d78d2ae644482d45196d92bcfc0b2d01788076010967a35c4673b836b4aca7ce.exe 1680 HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe 116 istripper.exe 1664 HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 4924 drpbx.exe 5084 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe 3640 HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 3928 Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe 2132 svhost.exe 3048 Trojan-Ransom.Win32.Blocker.kcwh-097b8e63a463b36ee4d257f90f2f966fd64f6b2113d09f4cb1c5193b88084caf.exe 1780 Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe 876 Trojan-Ransom.Win32.Crypren.afmk-56ec95785f91418751ad5788f9076af108ae19e03d2e0c0551ae8f8d8f5acba4.exe 2796 Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe 4820 Trojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exe 2468 Trojan-Ransom.Win32.GandCrypt.ali-458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exe 2728 Trojan-Ransom.Win32.GandCrypt.fdc-baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086.exe 5812 Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe 3112 iconvector.exe 4832 Trojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exe 7652 iconvector.exe 5456 Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe 8228 Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe 5216 Trojan-Ransom.Win32.GandCrypt.jdv-36dd709f3b95b414fde671bf19d4d8e5005bd78ea93fa289d2dfee53e6cad6e6.exe 1560 Trojan-Ransom.Win32.GandCrypt.jes-2e8c8217af2cf24aa4c0a7ca9fac5d9af8a5fbd97a315308bfa0acd79f8c74b9.exe 7804 MiniConvert.exe 6928 Trojan-Ransom.Win32.GandCrypt.jhg-0bd52fb870d8fe168bf0572b0aee988289a6e566fc152109e2ae1d36b7403a3a.exe 7872 Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe 2684 Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe 620 Trojan-Ransom.Win32.Locky.uu-8830340906fb52994d61ca61080ee5bef27e1da8fe7c104e835e31ca0b16c8c1.exe 7996 Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe 4256 Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe 280 Trojan-Ransom.Win32.Rack.ai-5578d702c7fd246e11f71c4edb27b316ca267c6161effab324c9f6e6260bc9e5.exe 6060 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe 9948 Trojan-Ransom.Win32.Shade.poa-26fec998b7b9ad941a346184b1eaaf7fc603abf8f8f96da025ba96f7021e7351.exe 11068 y_installer.exe 804 Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe 8108 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe 8348 UDS-Trojan-Ransom.Win32.GandCrypt.a-c92a67ff97aa05bb53a054ceb7991fd904e38bec205e50c609066f3a1582e723.exe 12328 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe 11136 coloStub.exe 12740 Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe 10816 YandexPackSetup.exe 8928 y_installer.exe 11416 MiniConvert.exe 5664 lite_installer.exe 11480 seederexe.exe 11640 sender.exe 4648 {F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe 3520 yb4B24.tmp 1628 setup.exe 9588 setup.exe 3588 setup.exe 10724 service_update.exe 10368 service_update.exe 9992 service_update.exe 11688 service_update.exe 10968 service_update.exe 7040 service_update.exe 13248 clidmgr.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe -
Loads dropped DLL 54 IoCs
pid Process 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 1688 HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 8780 MsiExec.exe 5336 browser.exe 5244 browser.exe 5336 browser.exe 10652 browser.exe 10652 browser.exe 7788 browser.exe 12092 browser.exe 7788 browser.exe 12092 browser.exe 9524 browser.exe 7264 browser.exe 9524 browser.exe 12064 browser.exe 3112 browser.exe 12064 browser.exe 3112 browser.exe 12064 browser.exe 12064 browser.exe 12064 browser.exe 12064 browser.exe 12064 browser.exe 2812 browser.exe 2812 browser.exe 9744 browser.exe 7584 browser.exe 9744 browser.exe 9656 browser.exe 12384 browser.exe 9656 browser.exe 12384 browser.exe 9656 browser.exe 9656 browser.exe 9656 browser.exe 9656 browser.exe 9656 browser.exe 9656 browser.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Explorer.EXE -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook Explorer.EXE -
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" HEUR-Trojan-Ransom.Win32.Convagent.gen-d78d2ae644482d45196d92bcfc0b2d01788076010967a35c4673b836b4aca7ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe" Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PrintCenter = "c:\\\\Users\\Admin\\ImageScanner.exe" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufekabit = "C:\\Windows\\qzetityn.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Updater = "C:\\Users\\Admin\\Desktop\\00367\\Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" istripper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Updater = "C:\\Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xvxkvpnaghu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\xofjrd.exe\"" Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mozilla = "C:\\Users\\Admin\\AppData\\Local\\Mozilla\\StatsReader.exe" Trojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Appolicy = "C:\\Users\\Admin\\AppData\\Roaming\\AppCbase\\coloStub.exe" Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mozilla = "C:\\Users\\Admin\\AppData\\Local\\Mozilla\\StatsReader.exe" MiniConvert.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YandexBrowserAutoLaunch_45886AE68CD319C7351FF54A1DBD4B87 = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --shutdown-if-not-closed-by-system-restart" browser.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Rack.ai-5578d702c7fd246e11f71c4edb27b316ca267c6161effab324c9f6e6260bc9e5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe File opened (read-only) \??\a: Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe File opened (read-only) \??\h: Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe File opened (read-only) \??\w: Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\b: Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe File opened (read-only) \??\j: Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37549 api.ipify.org 39244 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023ca3-7249.dat autoit_exe -
Checks system information in the registry 2 TTPs 4 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer browser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName browser.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 iconvector.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies iconvector.exe File created C:\Windows\System32\Info.hta Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE iconvector.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 iconvector.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Yandex\ui service_update.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 9256 tasklist.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\pidor.bmp" Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\bxmeoengtf.bmp" Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@LooCipher_wallpaper.bmp" Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yf7m84p7345.bmp" HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oXf.bmp" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a3f216.bmp" Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2124 HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe 4256 Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe -
Suspicious use of SetThreadContext 25 IoCs
description pid Process procid_target PID 2532 set thread context of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 4820 set thread context of 4832 4820 Trojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exe 136 PID 280 set thread context of 10704 280 Trojan-Ransom.Win32.Rack.ai-5578d702c7fd246e11f71c4edb27b316ca267c6161effab324c9f6e6260bc9e5.exe 158 PID 1588 set thread context of 12328 1588 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe 190 PID 5456 set thread context of 12740 5456 Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe 203 PID 7804 set thread context of 11416 7804 MiniConvert.exe 213 PID 11136 set thread context of 10232 11136 coloStub.exe 237 PID 11136 set thread context of 7256 11136 coloStub.exe 170 PID 10232 set thread context of 3416 10232 svchost.exe 56 PID 3416 set thread context of 9240 3416 Explorer.EXE 163 PID 3416 set thread context of 4648 3416 Explorer.EXE 242 PID 4648 set thread context of 3520 4648 {F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe 271 PID 3520 set thread context of 1628 3520 yb4B24.tmp 272 PID 1628 set thread context of 9588 1628 setup.exe 273 PID 9588 set thread context of 3588 9588 setup.exe 274 PID 9588 set thread context of 10724 9588 setup.exe 310 PID 10724 set thread context of 10368 10724 service_update.exe 311 PID 9588 set thread context of 13248 9588 setup.exe 318 PID 9588 set thread context of 12304 9588 setup.exe 320 PID 3416 set thread context of 5336 3416 Explorer.EXE 324 PID 5336 set thread context of 5244 5336 browser.exe 325 PID 5336 set thread context of 10652 5336 browser.exe 360 PID 5336 set thread context of 7788 5336 browser.exe 366 PID 5336 set thread context of 12092 5336 browser.exe 367 PID 5336 set thread context of 2812 5336 browser.exe 389 -
resource yara_rule behavioral1/memory/2140-141-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-150-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-153-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-152-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-149-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-148-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-3115-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-7274-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2140-12060-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/8348-25407-0x000000000F8B0000-0x000000000F8CB000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\S_ThumbUpOutline_22_N.svg.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\SmallTile.scale-200.png HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\root\3159sb8nje-readme.txt Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\INDUST.ELM Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\LICENSE Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\uk-ua\ui-strings.js.id-CAB9F1C5.[[email protected]].bip HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_scale-125.png HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationProvider.resources.dll Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Outlook.scale-300.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\3.jpg Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\3159sb8nje-readme.txt Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Resources.Reader.dll.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\3159sb8nje-readme.txt.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-80_altform-unplated_contrast-white.png HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SlowMotionEditor\UserControls\SpeedSelectionSlider.xbf HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\URLREDIR.DLL.id-CAB9F1C5.[[email protected]].bip HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\cs-cz\8a8ddc23.lock HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteWideTile.scale-100.png Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MYSL.ICO Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\EDGE.INF Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\Fingerprinting.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageWideTile.scale-125_contrast-white.png HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\SmallTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-stdio-l1-1-0.dll.id-CAB9F1C5.[[email protected]].bip HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\sr-Cyrl-BA\msipc.dll.mui.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNotePageSmallTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-16_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\3159sb8nje-readme.txt Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\nl-nl\3159sb8nje-readme.txt Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\duplicate.svg.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\local_policy.jar.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Net.Resources.dll Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\3159sb8nje-readme.txt HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionSmallTile.scale-100.png HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\de-de\8a8ddc23.lock HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jli.dll.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\sv_get.svg.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\GameBar_SmallTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinResearcher.xml HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-80_altform-unplated_contrast-white.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\3159sb8nje-readme.txt HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\3159sb8nje-readme.txt Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\root\ui-strings.js.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Grace-ul-oob.xrm-ms.id-CAB9F1C5.[[email protected]].bip HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\OutlookAccount.scale-100.png HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.XPath.dll.id-CAB9F1C5.[[email protected]].bip HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\VoiceRecorderSplashScreen.contrast-black_scale-200.png HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\8a8ddc23.lock HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\SmallTile.scale-125.png Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pt-br\3159sb8nje-readme.txt Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_PigEar.png Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_COL.HXT Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\en-US.PostalAddress.ot HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\it-IT.mail.config Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\1.png Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE.id-CAB9F1C5.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_LinkDrop32x32.gif Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\pt-br\ui-strings.js Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_pattern_RHP.png.id-CAB9F1C5.[[email protected]].bip HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIDF4F.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{5B964E0E-B9A3-4276-9ED9-4D5A5720747A} msiexec.exe File opened for modification C:\Windows\Installer\MSIF722.tmp msiexec.exe File created C:\Windows\Tasks\Update for Yandex Browser.job service_update.exe File created C:\Windows\Installer\e59bd99.msi msiexec.exe File opened for modification C:\Windows\win.ini Trojan-Ransom.Win32.GandCrypt.ali-458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exe File opened for modification C:\Windows\qzetityn.exe explorer.exe File opened for modification C:\Windows\Installer\e59bd99.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC961.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID27B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDD2B.tmp msiexec.exe File opened for modification C:\Windows\assembly Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSID9A0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEFDD.tmp msiexec.exe File created C:\Windows\Tasks\System update for Yandex Browser.job service_update.exe File created C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe File created C:\Windows\qzetityn.exe explorer.exe File opened for modification C:\Windows\Installer\MSICE53.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE4EE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE944.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF4C0.tmp msiexec.exe File created C:\Windows\Tasks\Repairing Yandex Browser update service.job service_update.exe File opened for modification C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 6432 3048 WerFault.exe 118 6540 2468 WerFault.exe 125 10120 4820 WerFault.exe 124 7392 12328 WerFault.exe 190 6720 7804 WerFault.exe 143 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iconvector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jhg-0bd52fb870d8fe168bf0572b0aee988289a6e566fc152109e2ae1d36b7403a3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language browser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.ali-458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language browser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language browser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clidmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language browser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.uu-8830340906fb52994d61ca61080ee5bef27e1da8fe7c104e835e31ca0b16c8c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language browser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language browser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 9588 setup.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName coloStub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 coloStub.exe -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jdv-36dd709f3b95b414fde671bf19d4d8e5005bd78ea93fa289d2dfee53e6cad6e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jes-2e8c8217af2cf24aa4c0a7ca9fac5d9af8a5fbd97a315308bfa0acd79f8c74b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UDS-Trojan-Ransom.Win32.GandCrypt.a-c92a67ff97aa05bb53a054ceb7991fd904e38bec205e50c609066f3a1582e723.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jdv-36dd709f3b95b414fde671bf19d4d8e5005bd78ea93fa289d2dfee53e6cad6e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jhg-0bd52fb870d8fe168bf0572b0aee988289a6e566fc152109e2ae1d36b7403a3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jhg-0bd52fb870d8fe168bf0572b0aee988289a6e566fc152109e2ae1d36b7403a3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jhg-0bd52fb870d8fe168bf0572b0aee988289a6e566fc152109e2ae1d36b7403a3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.jdv-36dd709f3b95b414fde671bf19d4d8e5005bd78ea93fa289d2dfee53e6cad6e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString UDS-Trojan-Ransom.Win32.GandCrypt.a-c92a67ff97aa05bb53a054ceb7991fd904e38bec205e50c609066f3a1582e723.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier UDS-Trojan-Ransom.Win32.GandCrypt.a-c92a67ff97aa05bb53a054ceb7991fd904e38bec205e50c609066f3a1582e723.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.GandCrypt.jes-2e8c8217af2cf24aa4c0a7ca9fac5d9af8a5fbd97a315308bfa0acd79f8c74b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.GandCrypt.jes-2e8c8217af2cf24aa4c0a7ca9fac5d9af8a5fbd97a315308bfa0acd79f8c74b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5132 timeout.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 12180 net.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS browser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName browser.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 9332 systeminfo.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 6588 vssadmin.exe 10484 vssadmin.exe 11968 vssadmin.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Web Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\elsword5 Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Web\Unit = "0" Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31142192" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\SuggestionsURL_JSON = "https://suggest.yandex.ru/suggest-ff.cgi?uil=ru&part={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\URL = "https://yandex.ru/search/?win=671&clid=2278732-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\NTURL = "https://yandex.ru/search/?win=671&clid=2278734-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "https://yandex.ru/search/?win=671&clid=2278732-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTURL = "https://yandex.ru/search/?win=671&clid=2278734-666&text={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe Key deleted \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\MINIE seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2184159970" IEXPLORE.EXE Key deleted \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0 seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ShowSearchSuggestionsInAddressGlobal = "1" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2185549973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\Local\\MICROS~1\\INTERN~1\\Services\\YANDEX~1.ICO" seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\LinksBandEnabled = "1" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2185549973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\SuggestionsURL seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009c8bcc52cefeec4eae8e26a9abce2f0100000000020000000000106600000001000020000000344882f42f3a476932b60b1cf1117a12432cff1b10f03aeddd507bb255afd5b7000000000e8000000002000020000000f9a1e603b2b6904d4374d44265e38a2786c29758af6987c52098974142b71253200000003ced87f2f62debed3960c785aba7944955b8dd4a4fcf854338505d1ca15cf5834000000034869939f9e87a05a71a7a297d666fd510a4fbd61f75e68e16d44e4e00b6de642568f3bb49a7fae2d426d65bf77ea80bd8613744d79f4f2eaa732d7bc8c7af95 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{0633EE93-D776-472f-A0FF-E1416B8B2E3A}" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437761186" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A42694A2-9D23-11EF-ADF2-6AACA39217E0} = "0" iexplore.exe Key deleted \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Яндекс" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "https://www.ya.ru/favicon.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL_JSON = "https://suggest.yandex.ru/suggest-ff.cgi?uil=ru&part={searchTerms}" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0 seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31142192" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconURL = "http://www.bing.com/favicon.ico" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31142192" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c2088b3031db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\NTLogoURL = "http://downloader.yandex.net/banner/ntpagelogo/{language}/{scalelevel}.png" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\FaviconPath = "C:\\Users\\Admin\\AppData\\Local\\MICROS~1\\INTERN~1\\Services\\YANDEX~1.ICO" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\c9be7348-9d23-11ef-a09f-6aaca39217e0\NTTopResultURL seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\DisplayName = "Bing" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\buffer\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" seederexe.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "https://www.ya.ru/?win=671&clid=2278731-666" seederexe.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\AppDataLow Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\AppDataLow\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\.DEFAULT explorer.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133754699242567302" browser.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" iconvector.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\AppDataLow Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-20 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-19\Software\AppDataLow\iaZzmYa6 explorer.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry browser.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix iconvector.exe Key created \REGISTRY\USER\S-1-5-19\Software\AppDataLow\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-20\Software Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\S-1-5-20\SOFTWARE\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\.DEFAULT\Software Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-20\Software\AppDataLow\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\.DEFAULT Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\AppDataLow\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\AppDataLow\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-20\Software\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\AppDataLow\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-20\Software\iaZzmYa6 explorer.exe Key created \REGISTRY\USER\S-1-5-19\Software Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\.DEFAULT\Software\iaZzmYa6 explorer.exe Key created \REGISTRY\USER\S-1-5-19\Software\iaZzmYa6 explorer.exe Key created \REGISTRY\USER\S-1-5-20 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-20\SOFTWARE\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (data) \REGISTRY\USER\S-1-5-20\SOFTWARE\AppDataLow\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\iaZzmYa6 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-20\Software\AppDataLow\iaZzmYa6 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex\UICreated_SYSTEM = "1" service_update.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" iconvector.exe Key created \REGISTRY\USER\.DEFAULT\Software\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-19 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-19\Software\iaZzmYa6 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Key created \REGISTRY\USER\S-1-5-19 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-20\SOFTWARE\AppDataLow\iaZzmYa6\68fuz6pw = b9d2a2938864091c3559ecc25880a5dba733b5ca7a8abd5974978d493983893e0e5ca0dac81d1f79b3231b13543ef214a66c6ced75cc42b9665b94d874d7c54c0100000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Yandex service_update.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.xhtml\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexJS.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationDescription = "Яндекс\u00a0Браузер – это быстрая и\u00a0удобная программа для\u00a0работы в\u00a0интернете и\u00a0просмотра веб-страниц." setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSVG.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexHTML.RC2CSCYBZBGJJIWPXAM6S2CBS4\AppUserModelId = "Yandex.RC2CSCYBZBGJJIWPXAM6S2CBS4" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.xht\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexFB2.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexPNG.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSWF.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationName = "Yandex" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\SystemFileAssociations\.webp\shell browser.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\Trojan-Ransom.Win32.GandCrypt.fdc-baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086.exe Trojan-Ransom.Win32.GandCrypt.fdc-baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexFB2.RC2CSCYBZBGJJIWPXAM6S2CBS4\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,-122" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\shell\open explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\yabrowser\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexHTML.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationDescription = "Яндекс\u00a0Браузер – это быстрая и\u00a0удобная программа для\u00a0работы в\u00a0интернете и\u00a0просмотра веб-страниц." setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.jpg\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\yabrowser\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\SystemFileAssociations\.tiff\shell\image_search\Icon = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\sage.notice\FriendlyTypeName\ = "encrypted file" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexBrowser.crx\Application\ApplicationName = "Yandex" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.webm setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\SystemFileAssociations\.bmp browser.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexHTML.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexWEBM.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.swf setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.htm setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\yabrowser\shell\open\command setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage seederexe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSVG.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationCompany = "Yandex" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexFB2.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationDescription = "Яндекс\u00a0Браузер – это быстрая и\u00a0удобная программа для\u00a0работы в\u00a0интернете и\u00a0просмотра веб-страниц." setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexJS.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.epub setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\SystemFileAssociations\.tiff\shell browser.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.tiff\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexJPEG.RC2CSCYBZBGJJIWPXAM6S2CBS4 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexPDF.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationCompany = "Yandex" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.css\OpenWithProgids setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\SystemFileAssociations\.webp\shell\image_search\Icon = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSVG.RC2CSCYBZBGJJIWPXAM6S2CBS4\ = "Yandex Browser SVG Document" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexTXT.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexHTML.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open\command setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexCRX.RC2CSCYBZBGJJIWPXAM6S2CBS4\ = "Yandex Browser CRX Document" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexGIF.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSVG.RC2CSCYBZBGJJIWPXAM6S2CBS4 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexXML.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\AppUserModelId = "Yandex.RC2CSCYBZBGJJIWPXAM6S2CBS4" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexXML.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationDescription = "Яндекс\u00a0Браузер – это быстрая и\u00a0удобная программа для\u00a0работы в\u00a0интернете и\u00a0просмотра веб-страниц." setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Software Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.crx\ = "YandexBrowser.crx" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexJS.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\SystemFileAssociations\.jpg\shell\image_search browser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexBrowser.crx\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexCSS.RC2CSCYBZBGJJIWPXAM6S2CBS4 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings seederexe.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\HomeButtonEnabled = "1" seederexe.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexCRX.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexHTML.RC2CSCYBZBGJJIWPXAM6S2CBS4\DefaultIcon setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.infected\OpenWithProgids\YandexINFE.RC2CSCYBZBGJJIWPXAM6S2CBS4 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexHTML.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationName = "Yandex" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSWF.RC2CSCYBZBGJJIWPXAM6S2CBS4 setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSVG.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexJS.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexJPEG.RC2CSCYBZBGJJIWPXAM6S2CBS4\Application\ApplicationIcon = "C:\\Users\\Admin\\AppData\\Local\\Yandex\\YandexBrowser\\Application\\browser.exe,0" setup.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\YandexSWF.RC2CSCYBZBGJJIWPXAM6S2CBS4\shell\open\command setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sage\ = "sage.notice" explorer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 y_installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 y_installer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 13076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 4444 powershell.exe 4444 powershell.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4368 7zFM.exe 3836 taskmgr.exe 3416 Explorer.EXE -
Suspicious behavior: MapViewOfSection 31 IoCs
pid Process 6060 Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe 12356 explorer.exe 11136 coloStub.exe 11136 coloStub.exe 10232 svchost.exe 3416 Explorer.EXE 3416 Explorer.EXE 4648 {F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe 3520 yb4B24.tmp 1628 setup.exe 9588 setup.exe 9588 setup.exe 10724 service_update.exe 9588 setup.exe 9588 setup.exe 3416 Explorer.EXE 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5336 browser.exe 5336 browser.exe 5336 browser.exe 5336 browser.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1780 Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4368 7zFM.exe Token: 35 4368 7zFM.exe Token: SeSecurityPrivilege 4368 7zFM.exe Token: SeDebugPrivilege 4352 taskmgr.exe Token: SeSystemProfilePrivilege 4352 taskmgr.exe Token: SeCreateGlobalPrivilege 4352 taskmgr.exe Token: SeDebugPrivilege 3836 taskmgr.exe Token: SeSystemProfilePrivilege 3836 taskmgr.exe Token: SeCreateGlobalPrivilege 3836 taskmgr.exe Token: 33 4352 taskmgr.exe Token: SeIncBasePriorityPrivilege 4352 taskmgr.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeDebugPrivilege 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe Token: SeDebugPrivilege 1588 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe Token: SeBackupPrivilege 5228 vssvc.exe Token: SeRestorePrivilege 5228 vssvc.exe Token: SeAuditPrivilege 5228 vssvc.exe Token: 0 2796 Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe Token: SeIncreaseQuotaPrivilege 9828 wmic.exe Token: SeSecurityPrivilege 9828 wmic.exe Token: SeTakeOwnershipPrivilege 9828 wmic.exe Token: SeLoadDriverPrivilege 9828 wmic.exe Token: SeSystemProfilePrivilege 9828 wmic.exe Token: SeSystemtimePrivilege 9828 wmic.exe Token: SeProfSingleProcessPrivilege 9828 wmic.exe Token: SeIncBasePriorityPrivilege 9828 wmic.exe Token: SeCreatePagefilePrivilege 9828 wmic.exe Token: SeBackupPrivilege 9828 wmic.exe Token: SeRestorePrivilege 9828 wmic.exe Token: SeShutdownPrivilege 9828 wmic.exe Token: SeDebugPrivilege 9828 wmic.exe Token: SeSystemEnvironmentPrivilege 9828 wmic.exe Token: SeRemoteShutdownPrivilege 9828 wmic.exe Token: SeUndockPrivilege 9828 wmic.exe Token: SeManageVolumePrivilege 9828 wmic.exe Token: 33 9828 wmic.exe Token: 34 9828 wmic.exe Token: 35 9828 wmic.exe Token: 36 9828 wmic.exe Token: SeIncreaseQuotaPrivilege 9828 wmic.exe Token: SeSecurityPrivilege 9828 wmic.exe Token: SeTakeOwnershipPrivilege 9828 wmic.exe Token: SeLoadDriverPrivilege 9828 wmic.exe Token: SeSystemProfilePrivilege 9828 wmic.exe Token: SeSystemtimePrivilege 9828 wmic.exe Token: SeProfSingleProcessPrivilege 9828 wmic.exe Token: SeIncBasePriorityPrivilege 9828 wmic.exe Token: SeCreatePagefilePrivilege 9828 wmic.exe Token: SeBackupPrivilege 9828 wmic.exe Token: SeRestorePrivilege 9828 wmic.exe Token: SeShutdownPrivilege 9828 wmic.exe Token: SeDebugPrivilege 9828 wmic.exe Token: SeSystemEnvironmentPrivilege 9828 wmic.exe Token: SeRemoteShutdownPrivilege 9828 wmic.exe Token: SeUndockPrivilege 9828 wmic.exe Token: SeManageVolumePrivilege 9828 wmic.exe Token: 33 9828 wmic.exe Token: 34 9828 wmic.exe Token: 35 9828 wmic.exe Token: 36 9828 wmic.exe Token: SeShutdownPrivilege 10816 YandexPackSetup.exe Token: SeIncreaseQuotaPrivilege 10816 YandexPackSetup.exe Token: SeSecurityPrivilege 11012 msiexec.exe Token: SeCreateTokenPrivilege 10816 YandexPackSetup.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4368 7zFM.exe 4368 7zFM.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 4352 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe 3836 taskmgr.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2728 Trojan-Ransom.Win32.GandCrypt.fdc-baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086.exe 9240 iexplore.exe 9240 iexplore.exe 7256 IEXPLORE.EXE 7256 IEXPLORE.EXE 8616 OpenWith.exe 3416 Explorer.EXE 9892 OpenWith.exe 5336 browser.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 3836 4352 taskmgr.exe 93 PID 4352 wrote to memory of 3836 4352 taskmgr.exe 93 PID 4444 wrote to memory of 4848 4444 powershell.exe 101 PID 4444 wrote to memory of 4848 4444 powershell.exe 101 PID 4848 wrote to memory of 1588 4848 cmd.exe 102 PID 4848 wrote to memory of 1588 4848 cmd.exe 102 PID 4848 wrote to memory of 1588 4848 cmd.exe 102 PID 4848 wrote to memory of 2804 4848 cmd.exe 103 PID 4848 wrote to memory of 2804 4848 cmd.exe 103 PID 4848 wrote to memory of 2804 4848 cmd.exe 103 PID 4848 wrote to memory of 2124 4848 cmd.exe 104 PID 4848 wrote to memory of 2124 4848 cmd.exe 104 PID 4848 wrote to memory of 2124 4848 cmd.exe 104 PID 4848 wrote to memory of 2140 4848 cmd.exe 106 PID 4848 wrote to memory of 2140 4848 cmd.exe 106 PID 4848 wrote to memory of 2140 4848 cmd.exe 106 PID 2804 wrote to memory of 116 2804 HEUR-Trojan-Ransom.MSIL.Gen.gen-e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b.exe 107 PID 2804 wrote to memory of 116 2804 HEUR-Trojan-Ransom.MSIL.Gen.gen-e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b.exe 107 PID 4848 wrote to memory of 1680 4848 cmd.exe 109 PID 4848 wrote to memory of 1680 4848 cmd.exe 109 PID 4848 wrote to memory of 1680 4848 cmd.exe 109 PID 1680 wrote to memory of 1664 1680 HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe 110 PID 1680 wrote to memory of 1664 1680 HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe 110 PID 1680 wrote to memory of 1664 1680 HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe 110 PID 4848 wrote to memory of 1688 4848 cmd.exe 111 PID 4848 wrote to memory of 1688 4848 cmd.exe 111 PID 4848 wrote to memory of 1688 4848 cmd.exe 111 PID 116 wrote to memory of 4924 116 istripper.exe 112 PID 116 wrote to memory of 4924 116 istripper.exe 112 PID 4848 wrote to memory of 5084 4848 cmd.exe 113 PID 4848 wrote to memory of 5084 4848 cmd.exe 113 PID 4848 wrote to memory of 5084 4848 cmd.exe 113 PID 4848 wrote to memory of 3640 4848 cmd.exe 114 PID 4848 wrote to memory of 3640 4848 cmd.exe 114 PID 4848 wrote to memory of 3640 4848 cmd.exe 114 PID 4848 wrote to memory of 2532 4848 cmd.exe 115 PID 4848 wrote to memory of 2532 4848 cmd.exe 115 PID 4848 wrote to memory of 2532 4848 cmd.exe 115 PID 4848 wrote to memory of 3928 4848 cmd.exe 116 PID 4848 wrote to memory of 3928 4848 cmd.exe 116 PID 2532 wrote to memory of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 2532 wrote to memory of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 2532 wrote to memory of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 2532 wrote to memory of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 2532 wrote to memory of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 2532 wrote to memory of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 2532 wrote to memory of 2132 2532 Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe 117 PID 4848 wrote to memory of 3048 4848 cmd.exe 118 PID 4848 wrote to memory of 3048 4848 cmd.exe 118 PID 4848 wrote to memory of 3048 4848 cmd.exe 118 PID 4848 wrote to memory of 1780 4848 cmd.exe 120 PID 4848 wrote to memory of 1780 4848 cmd.exe 120 PID 4848 wrote to memory of 1780 4848 cmd.exe 120 PID 4848 wrote to memory of 876 4848 cmd.exe 121 PID 4848 wrote to memory of 876 4848 cmd.exe 121 PID 4848 wrote to memory of 876 4848 cmd.exe 121 PID 4848 wrote to memory of 2796 4848 cmd.exe 122 PID 4848 wrote to memory of 2796 4848 cmd.exe 122 PID 4848 wrote to memory of 2796 4848 cmd.exe 122 PID 4848 wrote to memory of 4820 4848 cmd.exe 124 PID 4848 wrote to memory of 4820 4848 cmd.exe 124 PID 4848 wrote to memory of 4820 4848 cmd.exe 124 PID 4848 wrote to memory of 2468 4848 cmd.exe 125 PID 4848 wrote to memory of 2468 4848 cmd.exe 125 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\LockTaskbar = "1" Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Explorer.EXE -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3416 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00367.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4368
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /13⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3836
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe"HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe"5⤵
- Executes dropped EXE
PID:12328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12328 -s 4486⤵
- Program crash
PID:7392
-
-
-
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.MSIL.Gen.gen-e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\istripper.exe"C:\Users\Admin\AppData\Local\Temp\istripper.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\istripper.exe6⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
PID:4924
-
-
-
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exeHEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Convagent.gen-d78d2ae644482d45196d92bcfc0b2d01788076010967a35c4673b836b4aca7ce.exeHEUR-Trojan-Ransom.Win32.Convagent.gen-d78d2ae644482d45196d92bcfc0b2d01788076010967a35c4673b836b4aca7ce.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2140
-
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exeHEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe--8d8bfd295⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --partner 351634 --distr /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:11068 -
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe"C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:10816
-
-
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --stat dwnldr/p=351634/cnt=0/dt=11/ct=7/rt=0 --dh 2332 --st 17309962326⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8928
-
-
-
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798.exe4⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
PID:5084
-
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exeHEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵PID:7196
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exeTrojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe4⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"5⤵
- Executes dropped EXE
PID:2132
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exeTrojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- System policy modification
PID:3928
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Blocker.kcwh-097b8e63a463b36ee4d257f90f2f966fd64f6b2113d09f4cb1c5193b88084caf.exeTrojan-Ransom.Win32.Blocker.kcwh-097b8e63a463b36ee4d257f90f2f966fd64f6b2113d09f4cb1c5193b88084caf.exe4⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 5165⤵
- Program crash
PID:6432
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exeTrojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1780 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:3768
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:4928
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:6588
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:6804
-
C:\Windows\system32\mode.commode con cp select=12516⤵PID:9556
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:11968
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:5380
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"5⤵PID:8708
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Crypren.afmk-56ec95785f91418751ad5788f9076af108ae19e03d2e0c0551ae8f8d8f5acba4.exeTrojan-Ransom.Win32.Crypren.afmk-56ec95785f91418751ad5788f9076af108ae19e03d2e0c0551ae8f8d8f5acba4.exe4⤵
- Executes dropped EXE
PID:876
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exeTrojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2B24\3CF.bat" "C:\Users\Admin\AppData\Roaming\AppCbase\coloStub.exe" "C:\Users\Admin\Desktop\00367\TR3349~1.EXE""5⤵
- System Location Discovery: System Language Discovery
PID:5140 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AppCbase\coloStub.exe" "C:\Users\Admin\Desktop\00367\TR3349~1.EXE""6⤵PID:11364
-
C:\Users\Admin\AppData\Roaming\AppCbase\coloStub.exe"C:\Users\Admin\AppData\Roaming\AppCbase\coloStub.exe" "C:\Users\Admin\Desktop\00367\TR3349~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:11136 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:10232
-
-
-
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exeTrojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4820 -
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exeTrojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exe5⤵
- Executes dropped EXE
PID:4832
-
-
C:\Users\Admin\AppData\Local\Mozilla\MiniConvert.exeC:\Users\Admin\AppData\Local\Mozilla\MiniConvert.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:7804 -
C:\Users\Admin\AppData\Local\Mozilla\MiniConvert.exeC:\Users\Admin\AppData\Local\Mozilla\MiniConvert.exe6⤵
- Executes dropped EXE
PID:11416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7804 -s 7526⤵
- Program crash
PID:6720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 7725⤵
- Program crash
PID:10120
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.ali-458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exeTrojan-Ransom.Win32.GandCrypt.ali-458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 4925⤵
- Program crash
PID:6540
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.fdc-baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086.exeTrojan-Ransom.Win32.GandCrypt.fdc-baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exeTrojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Checks processor information in registry
PID:5812 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9828
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exeTrojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5456 -
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe"C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:12740
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exeTrojan-Ransom.Win32.GandCrypt.jcc-4bca0ed45ccd318fd65596f97d39c61f47ed4d81de5069a538008cb7268a4226.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:8228 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵PID:7092
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:12736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵PID:852
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵PID:10648
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:11368
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵PID:5872
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵PID:8468
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵PID:11004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵PID:11824
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:11980
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:10876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:8556
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵PID:6004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵PID:8744
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵PID:11564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:6872
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:9224
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:10976
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:10656
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:11796
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵PID:7468
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:7368
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵PID:7672
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵PID:9056
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵PID:8644
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵PID:8020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:7012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵PID:12340
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵PID:3216
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵PID:13192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:9644
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:13068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:11680
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:9716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵PID:10624
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵PID:1580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵PID:11084
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵PID:11988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:11756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru5⤵PID:11008
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru5⤵PID:8068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru5⤵PID:11876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru5⤵
- System Location Discovery: System Language Discovery
PID:9104
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru5⤵PID:6916
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.jdv-36dd709f3b95b414fde671bf19d4d8e5005bd78ea93fa289d2dfee53e6cad6e6.exeTrojan-Ransom.Win32.GandCrypt.jdv-36dd709f3b95b414fde671bf19d4d8e5005bd78ea93fa289d2dfee53e6cad6e6.exe4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5216
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.jes-2e8c8217af2cf24aa4c0a7ca9fac5d9af8a5fbd97a315308bfa0acd79f8c74b9.exeTrojan-Ransom.Win32.GandCrypt.jes-2e8c8217af2cf24aa4c0a7ca9fac5d9af8a5fbd97a315308bfa0acd79f8c74b9.exe4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1560
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.jhg-0bd52fb870d8fe168bf0572b0aee988289a6e566fc152109e2ae1d36b7403a3a.exeTrojan-Ransom.Win32.GandCrypt.jhg-0bd52fb870d8fe168bf0572b0aee988289a6e566fc152109e2ae1d36b7403a3a.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6928
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exeTrojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:7872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -c 5 & del "C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Gen.pvd-13507f1f60e81e3fcfc2244f5b9e4f5d9d04c6f0beaa34429879afdb24720c07.exe" /f /q5⤵
- System Location Discovery: System Language Discovery
PID:11660 -
C:\Windows\SysWOW64\timeout.exetimeout -c 56⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5132
-
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exeTrojan-Ransom.Win32.Gen.qqw-fd49914f47d9ed24fe475c263a32b34d9ed9e472379ede30530a4a3c64510d24.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Checks processor information in registry
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c vssadmin delete shadows /all /quiet5⤵PID:7096
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Locky.uu-8830340906fb52994d61ca61080ee5bef27e1da8fe7c104e835e31ca0b16c8c1.exeTrojan-Ransom.Win32.Locky.uu-8830340906fb52994d61ca61080ee5bef27e1da8fe7c104e835e31ca0b16c8c1.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exeTrojan-Ransom.Win32.Loo.c-924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d.exe4⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:7996
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exeTrojan-Ransom.Win32.Phpw.nh-5108c241f59800cc833025af2b3a7a4e5713fe75d292d9fa39253fbfa5ae9042.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
PID:4256
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Rack.ai-5578d702c7fd246e11f71c4edb27b316ca267c6161effab324c9f6e6260bc9e5.exeTrojan-Ransom.Win32.Rack.ai-5578d702c7fd246e11f71c4edb27b316ca267c6161effab324c9f6e6260bc9e5.exe4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:280 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"5⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:10704 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet6⤵
- Interacts with shadow copies
PID:10484
-
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exeTrojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: MapViewOfSection
PID:6060 -
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe"C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe" g5⤵
- Executes dropped EXE
PID:8108
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "txzsHJoH" /TR "C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.SageCrypt.eyt-680f825667330b4411f1500805e668c8366fe2ecbb6f29b79877b78774f6405b.exe" /SC ONLOGON /RL HIGHEST /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:13076
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"5⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: MapViewOfSection
PID:12356 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"6⤵
- System Location Discovery: System Language Discovery
PID:11108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet6⤵PID:9092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete6⤵PID:5480
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵
- System Location Discovery: System Language Discovery
PID:7152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet6⤵PID:6112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet6⤵PID:4596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete6⤵PID:6792
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵
- System Location Discovery: System Language Discovery
PID:11140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet6⤵PID:5176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet6⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete6⤵PID:6552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:11660
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵PID:3844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet6⤵PID:5000
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}6⤵PID:2432
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"6⤵PID:2984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN /F "txzsHJoH"6⤵PID:9032
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f710524372.vbs"6⤵PID:9356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet6⤵
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete6⤵PID:12552
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵
- System Location Discovery: System Language Discovery
PID:11044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet6⤵PID:5436
-
-
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Shade.poa-26fec998b7b9ad941a346184b1eaaf7fc603abf8f8f96da025ba96f7021e7351.exeTrojan-Ransom.Win32.Shade.poa-26fec998b7b9ad941a346184b1eaaf7fc603abf8f8f96da025ba96f7021e7351.exe4⤵
- Executes dropped EXE
PID:9948
-
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exeTrojan-Ransom.Win32.Sodin.b-6f286e8322e4799f8afe0f431dec82e955f193e68e81d1ec0a94f7597840317c.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵PID:5860
-
-
-
C:\Users\Admin\Desktop\00367\UDS-Trojan-Ransom.Win32.GandCrypt.a-c92a67ff97aa05bb53a054ceb7991fd904e38bec205e50c609066f3a1582e723.exeUDS-Trojan-Ransom.Win32.GandCrypt.a-c92a67ff97aa05bb53a054ceb7991fd904e38bec205e50c609066f3a1582e723.exe4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:8348
-
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\VEONJCZU-MANUAL.txt2⤵PID:6348
-
-
C:\Users\Admin\AppData\Local\Temp\{F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe"C:\Users\Admin\AppData\Local\Temp\{F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe" --job-name=yBrowserDownloader-{59937C1D-6040-40B5-B356-C925156D746D} --send-statistics --local-path=C:\Users\Admin\AppData\Local\Temp\{F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe --YABROWSER --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2278714-666&ui={fbccab4e-9ce0-4357-ae52-db1073608601} --use-user-default-locale2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\yb4B24.tmp"C:\Users\Admin\AppData\Local\Temp\yb4B24.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\e2170907-1727-4267-8830-cdcb0367ae2f.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=653304393 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{59937C1D-6040-40B5-B356-C925156D746D} --local-path="C:\Users\Admin\AppData\Local\Temp\{F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2278714-666&ui={fbccab4e-9ce0-4357-ae52-db1073608601} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\6f99406a-cb53-4079-9e8a-3202c70d1097.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\e2170907-1727-4267-8830-cdcb0367ae2f.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=653304393 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{59937C1D-6040-40B5-B356-C925156D746D} --local-path="C:\Users\Admin\AppData\Local\Temp\{F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2278714-666&ui={fbccab4e-9ce0-4357-ae52-db1073608601} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\6f99406a-cb53-4079-9e8a-3202c70d1097.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\e2170907-1727-4267-8830-cdcb0367ae2f.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=653304393 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{59937C1D-6040-40B5-B356-C925156D746D} --local-path="C:\Users\Admin\AppData\Local\Temp\{F1DB3B14-2554-44E8-B8B3-3DAE07A1FEF7}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=2278714-666&ui={fbccab4e-9ce0-4357-ae52-db1073608601} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\6f99406a-cb53-4079-9e8a-3202c70d1097.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico" --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=6806273865⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Time Discovery
- Modifies registry class
- Suspicious behavior: MapViewOfSection
PID:9588 -
C:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_9F565.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=9588 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x334,0x338,0x344,0x33c,0x368,0xb4cbe8,0xb4cbf4,0xb4cc006⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\TEMP\sdwra_9588_53654413\service_update.exe"C:\Windows\TEMP\sdwra_9588_53654413\service_update.exe" --setup6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:10724 -
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --install7⤵
- Executes dropped EXE
PID:10368
-
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Temp\clids.xml"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:13248
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source9588_1376368695\Browser-bin\clids_yandex_second.xml"6⤵PID:12304
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:6632
-
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:9332
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:11860
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:4692
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:12180
-
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=0 --install-start-time-no-uac=6533043932⤵
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Checks system information in the registry
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SetWindowsHookEx
PID:5336 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=5336 --annotation=metrics_client_id=35ed6f1f4e634915b0ba14e7aa318e62 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x260,0x264,0x268,0x23c,0x26c,0x73639a24,0x73639a30,0x73639a3c3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5244
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --gpu-process-kind=sandboxed --field-trial-handle=2472,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2452 /prefetch:23⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --gpu-process-kind=trampoline --field-trial-handle=2224,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:63⤵PID:13220
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --field-trial-handle=2404,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2236 --brver=24.10.2.705 /prefetch:33⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:10652
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=service --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Storage Service" --field-trial-handle=2728,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4740 --brver=24.10.2.705 /prefetch:83⤵PID:7928
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Audio Service" --field-trial-handle=3104,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4740 --brver=24.10.2.705 /prefetch:83⤵
- Loads dropped DLL
PID:7788
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Video Capture" --field-trial-handle=3676,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=1684 --brver=24.10.2.705 /prefetch:83⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:12092
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3932,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4828 /prefetch:13⤵PID:6080
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4184,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3220 /prefetch:23⤵PID:4268
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=3924,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3864 --brver=24.10.2.705 /prefetch:83⤵PID:7708
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=4220,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3864 --brver=24.10.2.705 /prefetch:83⤵PID:7312
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4260,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4232 /prefetch:13⤵PID:10184
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=ru --service-sandbox-type=none --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Утилиты Windows" --field-trial-handle=4604,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4728 --brver=24.10.2.705 /prefetch:83⤵
- Loads dropped DLL
PID:2812
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --gpu-process-kind=sandboxed --field-trial-handle=4708,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:23⤵PID:4380
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --ya-custo-process --enable-instaserp --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4836,i,5970696789429418870,6979242392126691207,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4716 /prefetch:13⤵PID:12656
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:13260
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:8012
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:1456
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:12864
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:5696
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
PID:9256
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:6828
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:4420
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:10064
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:6528
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:6392
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:11024
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:7528
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\E3F5.bin1 > C:\Users\Admin\AppData\Local\Temp\E3F5.bin & del C:\Users\Admin\AppData\Local\Temp\E3F5.bin1"2⤵PID:6516
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\2F6F.bin"2⤵PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3048 -ip 30481⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2468 -ip 24681⤵PID:6448
-
C:\Windows\SysWOW64\iconvector.exe"C:\Windows\SysWOW64\iconvector.exe"1⤵
- Executes dropped EXE
PID:3112 -
C:\Windows\SysWOW64\iconvector.exe--968c1d0e2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:7652
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5228
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:3384
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:9240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:9240 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:7256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4820 -ip 48201⤵PID:11072
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:8616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 12328 -ip 123281⤵PID:8976
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\334a637e78a34d7cb292f489a4f52fcb /t 10636 /p 87081⤵PID:10992
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:11012 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7267F6814CC3CF2FE3E925369695076D2⤵
- Loads dropped DLL
PID:8780 -
C:\Users\Admin\AppData\Local\Temp\A18AE22B-FF77-4BC0-9C05-5911A589E297\lite_installer.exe"C:\Users\Admin\AppData\Local\Temp\A18AE22B-FF77-4BC0-9C05-5911A589E297\lite_installer.exe" --use-user-default-locale --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --YABROWSER3⤵
- Executes dropped EXE
PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\3FDE7FC9-9915-463B-95AF-84CA06BF0B2D\seederexe.exe"C:\Users\Admin\AppData\Local\Temp\3FDE7FC9-9915-463B-95AF-84CA06BF0B2D\seederexe.exe" "--yqs=y" "--yhp=y" "--ilight=" "--oem=" "--nopin=n" "--pin_custom=n" "--pin_desktop=n" "--pin_taskbar=y" "--locale=us" "--browser=y" "--browser_default=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\0841AE35-7401-45EA-9FAF-473C93E69A9F\sender.exe" "--is_elevated=yes" "--ui_level=2" "--good_token=x" "--no_opera=n"3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
PID:11480 -
C:\Users\Admin\AppData\Local\Temp\0841AE35-7401-45EA-9FAF-473C93E69A9F\sender.exeC:\Users\Admin\AppData\Local\Temp\0841AE35-7401-45EA-9FAF-473C93E69A9F\sender.exe --send "/status.xml?clid=2278730-666&uuid=fbccab4e-9ce0-4357-ae52-db1073608601&vnt=Windows 10x64&file-no=8%0A10%0A11%0A12%0A13%0A17%0A18%0A20%0A21%0A22%0A25%0A36%0A40%0A42%0A43%0A57%0A61%0A89%0A102%0A103%0A123%0A124%0A125%0A129%0A"4⤵
- Executes dropped EXE
PID:11640
-
-
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\2210d12136414074b9b5b377b3912988 /t 2912 /p 53801⤵PID:6028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 7804 -ip 78041⤵PID:4588
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:9892
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x464 0x2c81⤵PID:12480
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --run-as-service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:9992 -
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=9992 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x93e784,0x93e790,0x93e79c2⤵
- Executes dropped EXE
PID:11688
-
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --update-scheduler2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:10968 -
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --update-background-scheduler3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7040
-
-
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\5529de1dae8649b286be318aa13a8137 /t 9364 /p 24321⤵PID:10140
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater --broupdater-origin=auto --bits_job_guid={862680A0-2108-407D-9E69-BB1BB2A496D1}1⤵
- Loads dropped DLL
- Checks system information in the registry
- Enumerates system info in registry
PID:9524 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1730996317 --annotation=last_update_date=1730996317 --annotation=launches_after_update=1 --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=9524 --annotation=metrics_client_id=35ed6f1f4e634915b0ba14e7aa318e62 --annotation=micromode=broupdater --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x73639a24,0x73639a30,0x73639a3c2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:7264
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --gpu-process-kind=sandboxed --field-trial-handle=2036,i,1412119435668471127,9483856540497191306,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2032 /prefetch:22⤵
- Loads dropped DLL
PID:12064
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --field-trial-handle=1940,i,1412119435668471127,9483856540497191306,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2092 --brver=24.10.2.705 /prefetch:32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --broupdater-stat-bits --broupdater-stat-name=install --bits_job_guid={B18260BF-18BB-45EF-8D2F-643F035A50B6}1⤵
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:9744 -
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" --url=https://crash-reports.browser.yandex.net/submit --annotation=install_date=1730996317 --annotation=last_update_date=1730996317 --annotation=launches_after_update=2 --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=9744 --annotation=metrics_client_id=35ed6f1f4e634915b0ba14e7aa318e62 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x73639a24,0x73639a30,0x73639a3c2⤵
- Loads dropped DLL
PID:7584
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --gpu-process-kind=sandboxed --field-trial-handle=2040,i,1962178282518056821,12945330219351937255,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2036 /prefetch:22⤵
- Loads dropped DLL
PID:9656
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id=fbccab4e-9ce0-4357-ae52-db1073608601 --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --field-trial-handle=1916,i,1962178282518056821,12945330219351937255,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2068 --brver=24.10.2.705 /prefetch:32⤵
- Loads dropped DLL
PID:12384
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
9Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
10Remote System Discovery
1System Information Discovery
10System Location Discovery
1System Language Discovery
1System Time Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.id-CAB9F1C5.[[email protected]].bip
Filesize378B
MD598962d016a5b57293099ef650cd17e6e
SHA1e83c9045b4b93f4df8edac3fff27b4a5d5c23266
SHA25642aea0839d749389ec05a582802374f3239d1ab269fbf8db1c288f6d6a57c977
SHA512ce03ca4f306fdb7c8bec99cfc3f77574c85c1f686ce200275024495e4fddffd8d62fe013d04c14b2a2d055493386aacbe86f0e7fe6bc9f205dfd0a3511463ac5
-
C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.id-CAB9F1C5.[[email protected]].bip.exe
Filesize880KB
MD57af02eb3a07ae3c85d42c8327471bdd7
SHA1d17e14b7f00640e19dd7f10089feeefd5f3a36b6
SHA2568156ceb68c832e8be1637cccc0c49856422442a7c7737f63acca62ec2b64cd9a
SHA51219276ac9b8d3448534d62c6102f9a7942dbe5397bb73f048c81f69e6174be89c36b21d794f6a0515392688cb8f5821cd992a85fbed0fae93344707214d182961
-
Filesize
8KB
MD52bda6a22a8d7ca0abab786f7750a71af
SHA120b00541c91a92e2a2364db96cf46d2a06cc04c2
SHA256b7832ba772c580878c9270d25a2bca107ef60254c77a5666ae60c1fb44883c94
SHA5129181fbf7cf757009b9696c187e12911dd30ee509a41642d7287300d559a713dc2904a501493656107080683e0ac56a333d0ef11d8fce4202bc0ac6ea4a61ebaf
-
Filesize
911B
MD5a46a064fe05acbdbc105dd492c82cc05
SHA1b3a700e95048f0cd5bab2f27efff10941efb1285
SHA256e0bb70a87aa10a92f2bf741fef750f55c824854a85118bcd0807c0bc30f35554
SHA512dab7eb4f4af11bdf41315b846f71ba508b464cc31acb78469ab97b6cec371e5537bd5f9c00d248156ea33e24cf761020b623857fdbadc5f8feda19cec7b5695f
-
Filesize
2.4MB
MD5fc97164a5dddd55d2d1ac6cc6156771d
SHA1cf7953ef61fd18941d2f9c1599ad01d5d57dd987
SHA256778a127b88bb644a7c66d08932a446b85409fe7049bbae0dc15b9d364f2870f4
SHA512d7ca2fc40a6dde28a567f86b5beb87c867f01e6832d7a49eafa9b3987b7e9ee992f6d5104181f19888f6e0af45a7e90b17ebeae489e3956fd537ce1ba02bc79c
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id-CAB9F1C5.[[email protected]].bip
Filesize3.2MB
MD507a3d371ae3492d18eccde8f47b3bd2f
SHA1f3d9f213f68d0f87d318b80a4e20a0d35f71414f
SHA256d74cfdfc62c02eec96637c80ab937b13b91074ba052d92fc4df85cc3f724b7a4
SHA512c1058b48eaa890d9c9e41ce392440d123f988f11dd5866b6574f4095ce39b28faf7f774f93c6730cc3417231ff2625b64d9e0fae1d3287d6b4599655317cf29c
-
Filesize
6KB
MD51fcd69c05e8e2908c18b0a929adc300b
SHA153bf65d503f58e7cd595b208b52ef5f7576aa86b
SHA256f6206f9b32a92011630bb6b787aa77960057ab61ead8790317c07fbc5881bea1
SHA512e6c9a9c8f4ff32971b2f43e990b5a877d0c2b1c509feb1927f82aaeae43bc5a3492b2a4071c74493dfe7cb5fa29d96350ed1d25417f40a09216aede1f15d9236
-
Filesize
4KB
MD59af278a64138acc91414099bd25a64bf
SHA1d311fefee65ce4fb8203b9840d143b72f1a5f19f
SHA256c066af2eb691c858f90b405feb3cfcae37e399eb1bd96f8171b1f061bdaf218e
SHA5121c3606a50218ec3ab73206298d278e97caf78610dfe51b51908aeba0d2fffa93575228231681d902b94932367452d3231d4d38587792d402f6d9a8dc15d4d4a7
-
Filesize
6KB
MD5b08dd9b270b31f233a7cecd0b338209a
SHA19400ddba61b70f0eaa9851d53a30b8f664e66092
SHA2566fd4c06238ce964d7284b91229aeac0459a969f56e188aa9ae5cdb86b8ec0d99
SHA512af3ea10fbb6d397a9bf2d63729ee3dd9271f8fb2fdacdf1a38452b12702dde7e4f731521e1ab5349f0a27b93a814e851b666f91127329078af0bb3a166178892
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
5KB
MD5a6f6261de61d910e0b828040414cee02
SHA1d9df5043d0405b3f5ddaacb74db36623dd3969dc
SHA2566bb91f1d74389b18bce6e71772e4c5573648c1a4823338193f700afdf8216be5
SHA51220cb7b646c160c942e379c6e7a1a8981a09f520361c0205052c1d66e2fdb76333ffaaf0ca1dfc779754f0e844b9946900fbd5690d01869e1607abc1fda6dffab
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
517KB
MD5b5a84f228a9a2c6646c7004357168b5a
SHA15086cb070635d400ecf68ac543cf53782aa15db9
SHA25623a8ea463e8a034573493916ce0ee70698961628e04d5aba16ca63fe6239fb35
SHA512e6bfb5f36c3222db640d1a708af0c52150cc487a16284064bcff97e3931e0398abfe9b33c8becb4257d6bbafc289c49871a8940ab42ae97851ec055376574ed0
-
Filesize
145B
MD53c9ddb5893d98ebf57cccef6a17f3148
SHA1659a567e3c7f90bfbeafe784ae4c616445ef4958
SHA2568a9ace6daa2c65da505942b299b886165ede7873ae3c7efc9e367efa55727f79
SHA5120e033f68ae1411c28b4abf210dbc60a8d54c1747b8eff30cb81d3ecc1506546ce658f45209d693a2ad9b74f7e6d364fb4de00aaa2d44c25b57e0f8c44be75c09
-
Filesize
10.1MB
MD5e6d10b61b551b826819f52ac1dd1ea14
SHA1be2cdcba51f080764858ca7d8567710f2a692473
SHA25650d208224541ab66617323d8d791c06970a828eeb15b214965a5d88f6a093d41
SHA5120d5d98424bab24ccced9b73d5ed58851d320e0540963a3ccc14da6d6231b2413136fa11458dc2155bb5844af9e28f3a053f8b7f709a806a4070c5ff737fb0ac8
-
Filesize
16B
MD5cfdae8214d34112dbee6587664059558
SHA1f649f45d08c46572a9a50476478ddaef7e964353
SHA25633088cb514406f31e3d96a92c03294121ee9f24e176f7062625c2b36bee7a325
SHA512c260f2c223ecbf233051ac1d6a1548ad188a2777085e9d43b02da41b291ff258e4c506f99636150847aa24918c7bbb703652fef2fe55b3f50f85b5bd8dd5f6e3
-
Filesize
38KB
MD5207c999c94496410a3881e00b108a548
SHA1d98b8d6f96b9373526e1838c5ee6e8d6f4442ab5
SHA256b55f7687e6bdf0319f2cb40ad71cc60086a56aaee10e8afb41c3641e10f57400
SHA512743d965a4f6eb942c1b09b1a1bf3588fa92780eb41a4085087b91952f02fa015c79c394a7d4afc3e50da44741eb7e54b0047033dc970cbaab8eef08e64f06bd2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
107KB
MD5c110fbc282a58b9cfb506782d4accb11
SHA18dee7667f667dc5da4ee7494a27e75eea172557b
SHA2563f2e30695b986a9ba647740d140fe44487cca14dd9617c351b506b586c98f2c3
SHA51254665a16668ed8bf76f2f0f88163db5354e1b2940957768e315885ecc0f553840df5dfdf344742b38e87bfd9189a67eada68901d33c6c744713aa203f6be4c2e
-
Filesize
14KB
MD56f3f3159057426053e0ad3515a5404ee
SHA111a7d6efe9499dcd6330f2ca9ce61bda5c5cb667
SHA2561b79946949032845853c1961b91a26deec826843e350dab3e91cc4d17342b83b
SHA5124cb261c3d0482bf0c0342a2ce87fca1914d9c8967a9dc852aa0dbd511e07ebf52e09bc208bab856003094077cca2357b99173d683def8c912b119ffe3c15441e
-
Filesize
189KB
MD5b18d1001e98ec00bfb8c802ce0fefe2a
SHA1a8fed86e4df6d790486a0db05d6b4e133d04ef8c
SHA256d6e1c2dcbb7d16bdd7e5082283603608159cf56800409e593d297ab47240dfe1
SHA512d07955cf8f84c3330d7990f7f553b0ac120a9bbbe02a918f5777a8667afe3f579aa10c743ec7d66d4b82e4f73df77abfd9305219e07d4ec9d432ff68519e61ca
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
1.6MB
MD51c9ff7df71493896054a91bee0322ebf
SHA138f1c85965d58b910d8e8381b6b1099d5dfcbfe4
SHA256e8b5da3394bbdd7868122ffd88d9d06afe31bd69d656857910d2f820c32d0efa
SHA512aa0def62b663743e6c3c022182b35cff33cb9abf08453d5098f3c5d32b2a8b0cd1cc5de64b93e39680c1d1396fef1fd50b642ca3ea4ba1f6d1078321d96916ab
-
Filesize
510B
MD527bdb0864e3f7a9f6c61810adeaa9f53
SHA13c911d197a054a51a1ad444e3bcc4b634063597a
SHA2565981cca348493c670d47550ec9b201662046f5bb7c298af860c28814ff2f112f
SHA5120a4d78904c5efc0a2529b8d6f3e8e7001dd59807de8e9bd195e2f8a561b2e15de827dd65a74f7010f534f24df5fa2adb3e56074848878119955890feacde24ea
-
Filesize
5KB
MD5bbc743a51868bf4c3e9ebe2c091c24ea
SHA113d06f962a3df570d854cccd2f0113d686328a16
SHA25601af04853d3122916b9004a080e37472f4b2345be20374d430c39a0a38b7f3dc
SHA5121772a8bb9a06a95bc21a83f0ed28e54c168934cdaa4fe885604b4b1c73a74c2b52de38cb1a3970b613aa73edead5bbeb9b301da9966c422cac9e1d1da442bb1e
-
Filesize
8.7MB
MD56e358158ab5be3e47deff097020a2a42
SHA132cf029a0e15ddb01b0513fda4158addecadf9c9
SHA2568b979e74878e9f8c8b4cbb6bdbd0faf8321718a2ed32040daf28ac2bed365f7a
SHA512bc5abed9bf03274d9dad6c242cc9870bb5fdccc61f205ba18ee2d5c82f36c1ce7632aa2a94723bc65fc057ff383fcf01312f3d50bf7198c622b5e4aba9f7eebe
-
Filesize
8KB
MD542a97368c30c3f21a3904a70b5ace40e
SHA1387abb2af67672b93ff9a5725a091e0856036c8a
SHA2568fbb24d7ef68e7ac56afe35feb24e37614f10d343a3a1b906e14d3e89c3e2e57
SHA512ff56ae8b1a7f137d183fdf5ac4c03836b5ada7cf91dc59ababaef211d02c4a390b39a216e8571187cb713331771e5f3ccaaf8f06436bef461a7e89467f73d8d5
-
Filesize
341B
MD5977bc7b2384ef1b3e78df8fbc3eeb16b
SHA17ee6110ca253005d738929b7ba0cc54ed2ed0a2e
SHA25682e288090168abe15419015317fd38f56c1136e7481f66656d84e0a2d861d4d6
SHA5124d154832ef3ac05abb1499a5bc8235d72f64cdaa3e6870206a6363c1d85d821604ae8a96850c2c8bd540d479b8dd5f3ce032472ed96bbf7eddb168ea3d2d1cf6
-
Filesize
1KB
MD52ecc2e71e18f9386a0f998437e97e3b4
SHA19923b230c514e709dcc1d082e9d52dd9bb0d0c4c
SHA256fc625ce8419dde583c636b36abe040a175d26e22e2863d38f2e3f7362927ad4c
SHA512aceab5815515fbf95828a56c58d322d3710e735378cf4123986b5f9f43fefc98b32b561cf1bc2ec6b5c1d5d0c89945be385658e823fd499df855589b73fce40b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\Extensions\ghjgbemlcjioaaejhnnmgfpiplgalgcl.json
Filesize119B
MD52ec6275318f8bfcab1e2e36a03fd9ffa
SHA1063008acf0df2415f5bd28392d05b265427aac5c
SHA25620832de8163d5af0a0c8bda863bcd6083df4f92175d856ce527de1dae1f7c433
SHA5125eee4555be05d07bce49c9d89a1a64bb526b83e3ca6f06e2f9ef2094ad04c892110d43c25183da336989a00d05dad6ff5898ff59e2f0a69dcaaf0aa28f89a508
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_en.png
Filesize1KB
MD51376f5abbe56c563deead63daf51e4e9
SHA10c838e0bd129d83e56e072243c796470a6a1088d
SHA256c56ae312020aef1916a8a01d5a1fc67ed3b41e5da539c0f26632c904a5e49c62
SHA512a0bab3bae1307ea8c7ccbd558b86c9f40e748cdd6fd8067bb33eeef863191534af367a0058111553a2c3a24e666a99009176a8636c0a5db3bf1aa6226130498f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_en_2x.png
Filesize3KB
MD5900fdf32c590f77d11ad28bf322e3e60
SHA1310932b2b11f94e0249772d14d74871a1924b19f
SHA256fe20d86fd62a4d1ab51531b78231749bd5990c9221eab1e7958be6d6aef292d9
SHA51264ebc4c6a52440b4f9f05de8ffb343c2024c4690fe5c9f336e78cd1dd01ae8225e8bc446f386feb442e76136b20d6b04ee293467b21f5b294ce25e500922f453
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_ru.png
Filesize1KB
MD5ff321ebfe13e569bc61aee173257b3d7
SHA193c5951e26d4c0060f618cf57f19d6af67901151
SHA2561039ea2d254d536410588d30f302e6ab727d633cf08cb409caa5d22718af5e64
SHA512e98fbfb4ed40c5ac804b9f4d9f0c163508c319ec91f5d1e9deb6a5d3eada9338980f1b5fe11c49e6e88935ecd50119d321ce55ca5bdd0723a6e8c414e1e68e16
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_ru_2x.png
Filesize3KB
MD5a6911c85bb22e4e33a66532b0ed1a26c
SHA1cbd2b98c55315ac6e44fb0352580174ed418db0a
SHA2565bb0977553ded973c818d43a178e5d9874b24539dacbd7904cd1871e0ba82b23
SHA512279fb0c1f2871ce41b250e9a4662046bc13c6678a79866eaf317cc93c997a683114122092214ce24f8e7f8a40520fe4ca03f54930148f4f794df0df3ecf74e9d
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\configs\all_zip
Filesize657KB
MD52c08a29b24104d4ae2976257924aa458
SHA1b318b5591c3c9e114991ff4a138a352fb06c8b54
SHA256b56d63a9d59d31d045d8b8bd9368a86080e0d2c0ef1dd92b6318682dc3766a85
SHA51211f71cadb24234f5e280c4c7d4a7bd53f655c4c7aa8c10118dbc665b8a34e2ec6530f22a86d976c7232f27e16976b53b06224e6b307a95b5b7ceaa0acc8e21c7
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\easylist\easylist.txt
Filesize620KB
MD58e4bcad511334a0d363fc9f0ece75993
SHA162d4b56e340464e1dc4344ae6cb596d258b8b5de
SHA2562f317fee439877eaadb1264bd3d1e153c963ef98596a4ccf227592aea12ae76f
SHA51265077bd249c51be198234ff927040ef849cd79adcd611ed2afae511bc2a257a21f13171bf01cb06fce788c1cff88c8ad39cf768c5900d77cd15453a35e7f0721
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\easylist\manifest.json
Filesize68B
MD515bcd6d3b8895b8e1934ef224c947df8
SHA1e4a7499779a256475d8748f6a00fb4580ac5d80d
SHA25677334f6256abddcc254f31854d1b00aa6743e20aadbb9e69187144847099a66b
SHA512c2d3778a99af8d8598e653593d5e2d1d0b3b2ace11addd2d3eeb2bf3b57d51bf938ddaf2d2743322e0ce02e291b81f61c319daf34c1cd604ffce1f6407a30b34
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\elokbjeafkcggjfjkakpchmcmhkhaofn\brand_settings.json
Filesize379B
MD5f70c4b106fa9bb31bc107314c40c8507
SHA12a39695d79294ce96ec33b36c03e843878397814
SHA2564940847c9b4787e466266f1bb921097abb4269d6d10c0d2f7327fde9f1b032b7
SHA512494dce5543e6dacc77d546015f4ea75fd2588625e13450dba7ba0bd4c2f548b28c746a0d42c7f9b20d37f92af6710927d4bccb2fee4faa17d3ec2c07ff547e70
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\fcgfaidpicddcilhjhafmmcgfodijhjd\brand_settings.json
Filesize316B
MD5a3779768809574f70dc2cba07517da14
SHA1ffd2343ed344718fa397bac5065f6133008159b8
SHA256de0fbb08708d4be7b9af181ec26f45fccd424e437bc0cfb5cf38f2604f01f7b2
SHA51262570be7ea7adee14b765d2af46fcd4dc8eec9d6274d9e00c5f361ff9b0cdb150305edad65a52b557c17dd9682e371004a471fa8958b0bd9cfbe42bb04ca5240
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\gopnelejddjjkamjfblkcijjikkinnec\brand_settings.json
Filesize246B
MD530fdb583023f550b0f42fd4e547fea07
SHA1fcd6a87cfb7f719a401398a975957039e3fbb877
SHA256114fd03aa5ef1320f6cc586e920031cf5595a0d055218ce30571ff33417806d3
SHA512bae328e1be15c368f75396d031364bef170cfcf95dbdf4d78be98cff2b37a174d3f7ebb85b6e9eb915bb6269898cbcecd8a8415dc005c4444175fe0447126395
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\import-bg.png
Filesize9KB
MD585756c1b6811c5c527b16c9868d3b777
SHA1b473844783d4b5a694b71f44ffb6f66a43f49a45
SHA2567573af31ed2bfcfff97ed2132237db65f05aff36637cd4bdeccdf8ca02cd9038
SHA5121709222e696c392ca7bcd360f9a2b301896898eb83ddfb6a9db0d0c226a03f50671633b8bed4d060d8f70df7282ffc2cd7ab1d1449acf2e07a7b6c251aa3a19e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\dictionary-ru-RU.mrf
Filesize1.1MB
MD50be7417225caaa3c7c3fe03c6e9c2447
SHA1ff3a8156e955c96cce6f87c89a282034787ef812
SHA2561585b1599418d790da830ef11e8eeceee0cbb038876fe3959cc41858bd501dbc
SHA512dfc0de77b717029a8c365146522580ab9d94e4b2327cef24db8f6535479790505c337852d0e924fbfa26e756b3aec911f27f5f17eba824496365c9a526464072
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\dictionary-ru-RU.mrf.sig
Filesize256B
MD5d704b5744ddc826c0429dc7f39bc6208
SHA192a7ace56fb726bf7ea06232debe10e0f022bd57
SHA256151739137bbbdf5f9608a82ec648bdf5d7454a81b86631b53dfc5ad602b207d6
SHA5121c01217e3480872a6d0f595ceb1b2242ffe3e1ff8b3fdd76eea13a7541606b94d3ccd69492a88220e0e40c17da5d785e4dba1d7501e6be749b9c46f72572ef6f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\stop-words-ru-RU.list
Filesize52B
MD524281b7d32717473e29ffab5d5f25247
SHA1aa1ae9c235504706891fd34bd172763d4ab122f6
SHA256cbeec72666668a12ab6579ae0f45ccbdbe3d29ee9a862916f8c9793e2cf55552
SHA5122f81c87358795640c5724cfabcabe3a4c19e5188cedeab1bd993c8ccfc91c9c63a63e77ac51b257496016027d8bccb779bd766174fa7ea2d744bd2e2c109cb8b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\safebrowsing\download.png
Filesize437B
MD5528381b1f5230703b612b68402c1b587
SHA1c29228966880e1a06df466d437ec90d1cac5bf2e
SHA2563129d9eaba1c5f31302c2563ebfa85747eda7a6d3f95602de6b01b34e4369f04
SHA5129eb45b0d4e3480a2d51a27ac5a6f20b9ef4e12bf8ac608043a5f01a372db5ea41a628458f7a0b02aaba94cd6bb8355a583d17666f87c3f29e82a0b899e9700bd
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\sxs.ico
Filesize43KB
MD5592b848cb2b777f2acd889d5e1aae9a1
SHA12753e9021579d24b4228f0697ae4cc326aeb1812
SHA256ad566a3e6f8524c705844e95a402cdeb4d6eed36c241c183147409a44e97ebcd
SHA512c9552f4db4b6c02707d72b6f67c2a11f1cf110b2c4ac5a1b7ac78291a14bf6eb35a9b4a05bc51ac80135504cd9dcad2d7a883249ee2e20a256cb9e9ceeb0032f
-
Filesize
617KB
MD558697e15ca12a7906e62fc750e4d6484
SHA1c5213072c79a2d3ffe5e24793c725268232f83ab
SHA2561313aa26cc9f7bd0f2759cfaff9052159975551618cba0a90f29f15c5387cad4
SHA512196b20d37509ea535889ec13c486f7ee131d6559fb91b95de7fdd739d380c130298d059148c49bf5808d8528d56234c589c9d420d63264f487f283f67a70c9a6
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\1-1x.png
Filesize18KB
MD580121a47bf1bb2f76c9011e28c4f8952
SHA1a5a814bafe586bc32b7d5d4634cd2e581351f15c
SHA256a62f9fdf3de1172988e01a989bf7a2344550f2f05a3ac0e6dc0ccd39ed1a697e
SHA512a04df34e61fd30764cf344b339ba2636b9280a358863f298690f6a8533c5e5dfa9773a14f8d16a5bb709ea17cf75e1da6302335aa9120009892e529bfad30df9
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\abstract\light.jpg
Filesize536KB
MD53bf3da7f6d26223edf5567ee9343cd57
SHA150b8deaf89c88e23ef59edbb972c233df53498a2
SHA2562e6f376222299f8142ff330e457867bad3300b21d96daec53579bf011629b896
SHA512fef8e951c6cf5cec82dbeafd306de3ad46fd0d90e3f41dcea2a6046c95ab1ae39bf8a6e4a696580246c11330d712d4e6e8757ba24bbf180eec1e98a4aec1583b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\abstract\light_preview.jpg
Filesize5KB
MD59f6a43a5a7a5c4c7c7f9768249cbcb63
SHA136043c3244d9f76f27d2ff2d4c91c20b35e4452a
SHA256add61971c87104187ae89e50cec62a196d6f8908315e85e76e16983539fba04b
SHA51256d7bd72c8a380099309c36912513bcafbe1970830b000a1b89256aae20137c88e1e281f2455bb381ab120d682d6853d1ef05d8c57dd68a81a24b7a2a8d61387
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\custogray_full.png
Filesize313B
MD555841c472563c3030e78fcf241df7138
SHA169f9a73b0a6aaafa41cecff40b775a50e36adc90
SHA256a7cd964345c3d15840b88fd9bc88f0d0c34a18edbf1ce39359af4582d1d7da45
SHA512f7433d17937342d9d44aa86bcc30db9ae90450b84aa745d2c7390ff430449e195b693a8ae6df35d05fee2d97149a58a7d881737d57902d9885c6c55393d25d6f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\preview.png
Filesize136B
MD50474a1a6ea2aac549523f5b309f62bff
SHA1cc4acf26a804706abe5500dc8565d8dfda237c91
SHA25655a236ad63d00d665b86ff7f91f2076226d5ed62b9d9e8f835f7cb998556545f
SHA512d8e3de4fea62b29fd719376d33a65367a3a2a2a22ed175cc1eeff3e38dfbaac448c97a6fbea55bc6159351d11a6aad97e09cb12548cf297e01bd23bf6074de08
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\wallpaper.json
Filesize233B
MD5662f166f95f39486f7400fdc16625caa
SHA16b6081a0d3aa322163034c1d99f1db0566bfc838
SHA2564cd690fb8ed5cd733a9c84d80d20d173496617e8dde6fca19e8a430517349ed5
SHA512360a175c5e72ff8d2a01ee4e0f365237bbd725b695139ea54afc905e9e57686c5db8864b5abf31373a9cb475adcbdb3db292daf0a53c6eb643a5d61b868ad39b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\fir_tree\fir_tree_preview.png
Filesize8KB
MD5d6305ea5eb41ef548aa560e7c2c5c854
SHA14d7d24befe83f892fb28a00cf2c4121aeb2d9c5d
SHA2564c2b561cf301d9e98383d084a200deb7555ec47a92772a94453d3d8d1de04080
SHA5129330009997d62c1804f1e4cf575345016cda8d6a1dd6cb7d2501df65ea2021df6b8a5bc26809ddfc84e6ff9450f1e404c135561b1b00b9e4915c69e84f89cfec
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\fir_tree\wallpaper.json
Filesize384B
MD58a2f19a330d46083231ef031eb5a3749
SHA181114f2e7bf2e9b13e177f5159129c3303571938
SHA2562cc83bc391587b7fe5ddd387506c3f51840b806f547d203ccd90487753b782f1
SHA512635828e7b6044eeede08e3d2bb2e68bc0dbbe9e14691a9fb6e2bc9a2ac96526d8b39c8e22918ff2d944fb07b2531077f8febd43028be8213aa2fad858b6ee116
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\flowers\flowers_preview.png
Filesize9KB
MD5ba6e7c6e6cf1d89231ec7ace18e32661
SHA1b8cba24211f2e3f280e841398ef4dcc48230af66
SHA25670a7a65aa6e8279a1a45d93750088965b65ea8e900c5b155089ca119425df003
SHA5121a532c232dd151474fbc25e1b435a5e0d9d3f61372036d97bcaab3c352e7037f1c424b54a8904ef52cf34c13a77b7ab295fb4fd006c3ab86289577f469a6cd4c
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\flowers\wallpaper.json
Filesize387B
MD5a0ef93341ffbe93762fd707ef00c841c
SHA17b7452fd8f80ddd8fa40fc4dcb7b4c69e4de71a0
SHA25670c8d348f7f3385ac638956a23ef467da2769cb48e28df105d10a0561a8acb9e
SHA512a40b5f7bd4c2f5e97434d965ef79eed1f496274278f7caf72374989ac795c9b87ead49896a7c9cbcac2346d91a50a9e273669296da78ee1d96d119b87a7ae66a
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan.jpg
Filesize211KB
MD5c51eed480a92977f001a459aa554595a
SHA10862f95662cff73b8b57738dfaca7c61de579125
SHA256713c9e03aac760a11e51b833d7e1c9013759990b9b458363a856fd29ea108eec
SHA5126f896c5f7f05524d05f90dc45914478a2f7509ea79114f240396791f658e2f7070e783fab6ac284327361dc2a48c5918b9f1c969b90795ceacce2c5c5bfa56ca
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan.webm
Filesize9.6MB
MD5b78f2fd03c421aa82b630e86e4619321
SHA10d07bfbaa80b9555e6eaa9f301395c5db99dde25
SHA25605e7170852a344e2f3288fc3b74c84012c3d51fb7ad7d25a15e71b2b574bfd56
SHA512404fb2b76e5b549cbcba0a8cf744b750068cbd8d0f9f6959c4f883b35bcaa92d46b0df454719ca1cef22f5924d1243ba2a677b2f86a239d20bfad5365dc08650
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan_preview.jpg
Filesize26KB
MD51edab3f1f952372eb1e3b8b1ea5fd0cf
SHA1aeb7edc3503585512c9843481362dca079ac7e4a
SHA256649c55ccc096cc37dfe534f992b1c7bda68da589258611924d3f6172d0680212
SHA512ecd9609fbf821239ddcbdc18ef69dade6e32efd10c383d79e0db39389fa890a5c2c6db430a01b49a44d5fa185f8197dbbde2e1e946f12a1f97a8c118634c0c34
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\meadow\preview.png
Filesize5KB
MD5d10bda5b0d078308c50190f4f7a7f457
SHA13f51aae42778b8280cd9d5aa12275b9386003665
SHA2560499c4cc77a64cc89055b3c65d7af8387f5d42399ff2c0a2622eccbd6d481238
SHA512668e1a70a50a0decf633167ac23cba6916d0e05d0894daae1f7e3d487519f0a126abd4298430b38f52746a5c3b83ccd520b3d9b0ae1a79f893e36821a0458566
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\meadow\wallpaper.json
Filesize439B
MD5f3673bcc0e12e88f500ed9a94b61c88c
SHA1e96e2b2b5c9de451d76742f04cc8a74b5d9a11c0
SHA256c6581e9f59646e0a51a3194798ec994c7c5c99f28897108838aaf4a4e2bda04a
SHA51283fb3fe4a3562449a53c13d1c38d5fe9ef1fa55c3006f59b65eace9a6ad4963e768088bc500dbe5266b5979c6ace77874ef11a15a7bd9fabae00ff137e70ecb5
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\misty_forest\preview.png
Filesize5KB
MD577aa87c90d28fbbd0a5cd358bd673204
SHA15813d5759e4010cc21464fcba232d1ba0285da12
SHA256ea340a389af6d7ad760dff2016cf4e79488bda1a45d0a415b3cd02a4430c9711
SHA512759519b8822a6a4b88fc9ba47fa9d5d898b2f5a0f359acfbefc04809e6d7f5df86fb130f191eb6f63322792a18c0e7170aedf3ce7060fd9ad7e1bec2e686c3b2
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\misty_forest\wallpaper.json
Filesize423B
MD52b65eb8cc132df37c4e673ff119fb520
SHA1a59f9abf3db2880593962a3064e61660944fa2de
SHA256ebe9cadad41bd573f4b5d20e3e251410300b1695dfdf8b1f1f1276d0f0f8fa6d
SHA512c85fe6895453d0c38a1b393307b52d828bad8fa60d1d65bb83ffa3c5e17b71aa13cab60955489198503839ce5a4a6c1bb353752ab107f5e5b97908116c987e52
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\mountains_preview.jpg
Filesize35KB
MD5a3272b575aa5f7c1af8eea19074665d1
SHA1d4e3def9a37e9408c3a348867169fe573050f943
SHA25655074794869b59cd5c693dfa6f6615aea068c2cd50cdae6dd69bd0410661ded8
SHA512c69bf39362658dd6cbd827cf6db0f188a9c4410b3c6b7b532595fd5907974e2141d857942ffb2497282e31eaa33c71240c2c2bd8721046df55e3358e8b76c061
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_dark\neuro_dark_preview.jpg
Filesize24KB
MD529c69a5650cab81375e6a64e3197a1ea
SHA15a9d17bd18180ef9145e2f7d4b9a2188262417d1
SHA256462614d8d683691842bdfb437f50bfdea3c8e05ad0d5dac05b1012462d8b4f66
SHA5126d287be30edcb553657e68aef0abc7932dc636306afed3d24354f054382852f0064c96bebb7ae12315e84aab1f0fd176672f07b0a6b8901f60141b1042b8d0be
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_dark\neuro_dark_static.jpg
Filesize2.4MB
MD5e6f09f71de38ed2262fd859445c97c21
SHA1486d44dae3e9623273c6aca5777891c2b977406f
SHA256a274d201df6c2e612b7fa5622327fd1c7ad6363f69a4e5ca376081b8e1346b86
SHA512f6060b78c02e4028ac6903b820054db784b4e63c255bfbdc2c0db0d5a6abc17ff0cb50c82e589746491e8a0ea34fd076628bbcf0e75fa98b4647335417f6c1b7
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_light\neuro_light_preview.jpg
Filesize13KB
MD5d72d6a270b910e1e983aa29609a18a21
SHA1f1f8c4a01d0125fea1030e0cf3366e99a3868184
SHA256031f129cb5bab4909e156202f195a95fa571949faa33e64fe5ff7a6f3ee3c6b3
SHA51296151c80aac20dbad5021386e23132b5c91159355b49b0235a82ca7d3f75312cfea9a2158479ebc99878728598b7316b413b517b681486105538bbeb7490b9c2
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_light\neuro_light_static.jpg
Filesize726KB
MD59c71dbde6af8a753ba1d0d238b2b9185
SHA14d3491fa6b0e26b1924b3c49090f03bdb225d915
SHA256111f666d5d5c3ffbcb774403df5267d2fd816bdf197212af3ac7981c54721d2e
SHA5129529a573013038614cd016a885af09a5a06f4d201205258a87a5008676746c4082d1c4a52341d73f7c32c47135763de6d8f86760a3d904336f4661e65934077e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\peak\preview.png
Filesize5KB
MD51d62921f4efbcaecd5de492534863828
SHA106e10e044e0d46cd6dccbcd4bae6fb9a77f8be45
SHA256f72ea12f6c972edfe3d5a203e1e42cbbaf4985633de419342c2af31363f33dab
SHA512eec8171bd3bea92e24066e36801f334ac93905b7e8e50935f360e09fa8c9b9f848c4c62b687299e8297c0693d6dbaf9c6035b471e6345d626510b73e3606ee4d
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\peak\wallpaper.json
Filesize440B
MD5f0ac84f70f003c4e4aff7cccb902e7c6
SHA12d3267ff12a1a823664203ed766d0a833f25ad93
SHA256e491962b42c3f97649afec56ad4ea78fd49845ceb15f36edddd08d9e43698658
SHA51275e048c1d1db6618ead9b1285846922c16a46ee138a511e21235342a5a6452c467b906578bdd4a56e7b9e0a26535df6fb6319ae1cae238055887b48963fa6ed6
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\raindrops\raindrops_preview.png
Filesize7KB
MD528b10d683479dcbf08f30b63e2269510
SHA161f35e43425b7411d3fbb93938407365efbd1790
SHA2561e70fc9965939f6011488f81cd325223f17b07ee158a93c32c124602b506aa6b
SHA51205e5b5e9c5ef61f33a883b0286c2239cb2a464581d6e8a86d7b179b1887b4cb2cd7304e0821cdd3208501421c44c63c248a5166c790792717a90f8ac528fbf2f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\raindrops\wallpaper.json
Filesize385B
MD55f18d6878646091047fec1e62c4708b7
SHA13f906f68b22a291a3b9f7528517d664a65c85cda
SHA256bcfea0bebf30ee9744821a61fcce6df0222c1a266e0995b9a8cfbb9156eeeefd
SHA512893b2077a4abaa2fe89676c89f5e428ccd2420177268159395b5568824dd3fe08bea8a8b2f828c6c9297b19e0f8e3a1b7899315c0b07f4b61fc86ce94301518b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea.webm
Filesize12.5MB
MD500756df0dfaa14e2f246493bd87cb251
SHA139ce8b45f484a5e3aa997b8c8f3ad174e482b1b9
SHA256fa8d0ae53ebdbec47b533239709b7e1514ecb71278907621ca2d288241eb0b13
SHA512967670863f3c77af26fa1d44cd7b4fe78148d2ba6ea930b7b29b9f35d606554d664c0577068e0c26fa125d54627d7e7543360bce4acee0af17783b07450b5f52
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea\sea_preview.png
Filesize3KB
MD53c0d06da1b5db81ea2f1871e33730204
SHA133a17623183376735d04337857fae74bcb772167
SHA25602d8e450f03129936a08b67f3a50ea5d2e79f32c4e8f24d34b464f2cb5e0b086
SHA512ff0e60c94fc3c0c61d356a26667c5170256e1143b29adf23d4e7d27012da72ed8865ef59dc2046314c7335b8d3d331e5fd78f38b9b92f6af48729dae80f85b15
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea\wallpaper.json
Filesize379B
MD592e86315b9949404698d81b2c21c0c96
SHA14e3fb8ecf2a5c15141bb324ada92c5c004fb5c93
SHA256c2bb1e5d842c7e5b1b318f6eb7fe1ce24a8209661ddd5a83ab051217ca7c3f65
SHA5122834b1ef7bb70b2d24c4fedef87cd32c6e8f401d8ee5f3852808f6a557724ce036c31a71298cd0ed601cde4be59ec4042542351c63c4e0ac3d31419f79240956
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea_preview.jpg
Filesize59KB
MD553ba159f3391558f90f88816c34eacc3
SHA10669f66168a43f35c2c6a686ce1415508318574d
SHA256f60c331f1336b891a44aeff7cc3429c5c6014007028ad81cca53441c5c6b293e
SHA51294c82f78df95061bcfa5a3c7b6b7bf0b9fb90e33ea3e034f4620836309fb915186da929b0c38aa3d835e60ea632fafd683623f44c41e72a879baf19de9561179
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea_static.jpg
Filesize300KB
MD55e1d673daa7286af82eb4946047fe465
SHA102370e69f2a43562f367aa543e23c2750df3f001
SHA2561605169330d8052d726500a2605da63b30613ac743a7fbfb04e503a4056c4e8a
SHA51203f4abc1eb45a66ff3dcbb5618307867a85f7c5d941444c2c1e83163752d4863c5fc06a92831b88c66435e689cdfccdc226472be3fdef6d9cb921871156a0828
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\stars\preview.png
Filesize6KB
MD5ed9839039b42c2bf8ac33c09f941d698
SHA1822e8df6bfee8df670b9094f47603cf878b4b3ed
SHA2564fa185f67eaf3a65b991cea723d11f78de15a6a9a5235848a6456b98a9d7f689
SHA51285119055ddfc6bc4cca05de034b941b1743cbb787607c053e8c10309572d2ef223786fc454d962fbb5e3cde5320117f9efe99041116db48916bc3d2fcd4ffa25
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\stars\wallpaper.json
Filesize537B
MD59660de31cea1128f4e85a0131b7a2729
SHA1a09727acb85585a1573db16fa8e056e97264362f
SHA256d1bef520c71c7222956d25335e3ba2ea367d19e6c821fb96c8112e5871576294
SHA5124cb80766c8e3c77dfb5ca7af515939e745280aa695eca36e1f0a83fb795b2b3ef406472f990a82c727cea42d1b4ef44a0d34a7f4f23e362f2992dbff2527798b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\web\wallpaper.json
Filesize379B
MD5e4bd3916c45272db9b4a67a61c10b7c0
SHA18bafa0f39ace9da47c59b705de0edb5bca56730c
SHA2567fdddc908bd2f95411dcc4781b615d5da3b5ab68e8e5a0e2b3d2d25d713f0e01
SHA5124045e262a0808225c37711b361837070d0aeb5d65a32b5d514cc6f3c86962ba68f7d108bf4d81aa3bf645789d0753029a72c1ce34688a6d7af15f3e854c73f07
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\web\web_preview.png
Filesize8KB
MD53f7b54e2363f49defe33016bbd863cc7
SHA15d62fbfa06a49647a758511dfcca68d74606232c
SHA2560bbf72a3c021393192134893777ecb305717ccef81b232961ca97ae4991d9ba8
SHA512b3b458860701f3bc163b4d437066a58b5d441d8a427a8b03772c9c519c01983e3d3fdb8da20f6a53ad95c88dcdd0298f72822f39bc3672cb6f1d77fcc3f025a9
-
Filesize
48B
MD5d46bd504b29ca1f513101fe9ce95d98f
SHA105a69dc3ff5d5736a5301d49ae3e589009579a7e
SHA2560ed6fcc4086807858ad93b3e6dd1be3a8b138e06b87db3e00ffd8c0916bddaaa
SHA512ce3d3bab404e799bd779e18bcce3cef324dc7c8b8a31f5d40ed13ef50d52bb0a8e112d01e9198d2abe84e427ab0eba2cf8d3ba64c6d1d4dc32258501c4f79a6f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Extension Scripts\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
11KB
MD5a3544236ab7df637591ca8c881d778ab
SHA1c9202eb8c9947e3f6d2f4520792738966877e60b
SHA2562feaa0650a891d1e6caca3edbb512d15c29d3750cba76c4290366ecc51aafb08
SHA512fce6179f5d74911d5b93fe9cfd50ea7db61d0beb105ab3018f6edb1e6278b38efd4e8341611d9164ec2623663149269845d7a2e8ebdf06810a8e6be52734e871
-
Filesize
7KB
MD50e9806234eeae02e40bc83ab23e122de
SHA11ce5397dc72970db6f745bb6f9a3cc06ce1ac34c
SHA25695091b2987204ca4e66e25b3358b3c1201789e030809d179859aa68e34ce77a3
SHA512f498bba8cd6db4ed83c385c2d110dd1ae2789824f76efb815dfa02c4ec280415d0bdbffec0b0f86dadb0fee8c9e4465f1fee6b49f15647c1d86492dcd368c554
-
Filesize
14KB
MD54e008e3a6804d466f2c83a3008298169
SHA136b93c2ecb2105c1b5d0c29b82d3321868a07bf8
SHA256a6fe498e0a88345d4845d2cb17703ebcb72237137efee59f0272c443e048b98a
SHA5128bb1c4f98e3f9e00569f42c69edc523c1dba6564218c368b2559a1c6000add29dae075348ac1380a211bb333d8249b7b2a2a9b0c393916504ab3dd40bfe480f6
-
Filesize
3KB
MD5701c81819504f7e9fd5e19e44fac8090
SHA16e06c3d5dc8746a452f09cf90dd34a6338490b1f
SHA25649873c00d3b551f9388889a1a34503740188cda6acc3b8f062da5a4ae9e2f914
SHA512cc1452c2556892a764b7dd9b1ae5035189721d6f0641b47a9cd5d02174cd81dce89c823abbcb5d152c819b39a2c2cd93b0d4e3d7aeb5e4ca7eab336dcfd99d2f
-
Filesize
11KB
MD5b656659515922cf8166d2854272aef56
SHA103d858ab2fefc5fda5614d06d0ff29ea1ebc60dd
SHA256a9f1569ce3f44a320d1c32051f9c48055bdc397f84f6c8acfe93c59cbd46f375
SHA5129b98f5f29666d831e3e834f828a2949fa0678138a6d5b535f0b401c40ce2edd219949fa152b2027c9f9a22a18a1671150c335ffb680789522650e76912246483
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Secure Preferences~RFe5afcff.TMP
Filesize2KB
MD585f1290ec98b9ee48d84aa812a4dcede
SHA14f138b2eccb85805cd8b78706cae00390195a4ca
SHA256e073f01c8e66517b5109778c295fbf67479c988361d8bad323477d4dbef3e461
SHA512d66df10456ca3ee0b0e69b4b128b4500b56fe30b90ea7b0aa505dd9ba057c850c71dd049be31e70b6cdd30ee2ff6e811d3f1e5d2d4c8d81dd1e57f8d2f6527d4
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
160KB
MD554497ce2271deb0e673ec048b44da343
SHA15f886314234b7aa6a4da5efc937a9d63ed007727
SHA2563dcf052bb8050fa32f28873bb665f63f457799cb9a92549fb2dbea94014f929b
SHA512d0d77d763b1b12c1b9d7a9a3f2aee4640ed5fb10d828b7c3c2cb051504c2b7b6438309124b934b346a4152c0aca009883d6bda42dc997188b8ca2736ac3419c9
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\c60db8be-d85b-4fc7-9ef3-c7ac1642550b.tmp
Filesize212KB
MD56bab1b0f4a558f5a26fa493160e9d187
SHA119c5614b11a90a1b9f81b44807691f09b82dac17
SHA256b52ae1aa9170ea6ed52c76709d97d47cdcef72bc9fca666d93c0de3b39b1d2d5
SHA5124c5417c905fdd867e573db431bab32c87eb75dfbd0f84b51977f148886cc654c0fde43cdda98c8763975b336da7ca0b7666e77900255c945454467a8fe3ebab3
-
Filesize
8KB
MD510244f10eeff5cdf19bea55e234a9df0
SHA1fed6f0f5c5551290cf33970bf027d8bb226c3bf0
SHA25615e61f8ffa662bab2e9d1cc7b9db7ce756c754d3e8f5902c37816cb0c05b3275
SHA51227badd71e962640676125ccfbe63526409b24a4189b99df5b2acf4e07dc3a559646f8cc7f2004e5f4b91e8fa4b142a7efd969dfd5ac65f317e2c26157cf46910
-
Filesize
1KB
MD5b0df49fb3103baf17cd1c78145d79f17
SHA1b1bfdefe763e4a88365206761445cc0f3cea804f
SHA2566a998a52582b162f357271aee4e8cd3f074a91e56dc2a6d2c5cd3387b63490a4
SHA5123ebf0490d490c15c37d51a80c1cfba9f3ed1d7aea41498c86b3d6d1ec423674bdec79bc85a0608f5bfc7cd8e33785a45447324a24659fee00e440a280c8a2899
-
Filesize
1KB
MD52edad2db07a330ba4d092bda1f79e2f5
SHA1e9c6fe8e4f9da607d559c931cd34bdeaeea4a217
SHA256adfef7c0833365d4443d2a1e749a51f99bd058f2c76980b5871f6821b0185ff1
SHA512664e0fb831babc9999ee529000dc7c8cae8558997741c3218db392a07ee5006240bef46ba1b5549807d7243bf78d8466502cdaee9e8729928edbbbcf86349b4b
-
Filesize
339KB
MD517f19fc4a0dc23452fad3c6117fd8b73
SHA168f56e2c56296a10b06f768c1e82c9fbe5b30867
SHA256ca18991771e8916dcab2613b02d751f7becfa13062f7dd1c383d4789c5ad35ed
SHA512ac3b37acd2613a67dbe38e67f422f478b309542df25e46bc2f52083e3ffb42bba109e7059a9d912552e3b2e803e7203f2903e69e7805e5c1827d32666a6076b8
-
Filesize
90KB
MD5985d536403fbd60433f7ba9519548015
SHA1b01271b14b609c3aa009bcfd312ca500305b8905
SHA2565584b4e6340488bcab39a7e614d9fc0ed090843a5e251bc3f73a05a1b8c4b6e8
SHA512b63d16142a54457a33a46323cdd19ce4fef34a290db80f4ef9372e66ad5f5b50293a14e487850fe9262e2ffb477a4a09878974445c2e43cf6244d5d8972bc60f
-
Filesize
68KB
MD53a9850be978262a41654d179bfe71191
SHA1c7092e530f734384df9834192f6e52cdf46a92af
SHA25678baf414c224e5d457d796cd3fb6addf3ac5441fa83927958be50c18c98fd729
SHA5128a6c366a36b41ca8690621716a8d86a6e2843f423270862fd20d6a8376a3aa4e46a4ff3819c9bbf65a2dacef0949fdbc07c44d71c2a9cb3b55c4347dad66df2d
-
Filesize
2KB
MD52001df5259135a5a1e62341ee7d52ef1
SHA176b065d08e8a30df7e6a23a1b63ddf7d475d3af8
SHA2565e638818057b209b6a8baeabf9b14181838f07a088f9d92afdefee83bd887243
SHA512e3bb3b42873961a360a6a0e67d5a82d213e0b8bec838b74c648cb49f5341348428d6c82854c07fe0dc3e5521974c173126e9d9c7136b0544d9f8da10d89ea08f
-
Filesize
1KB
MD53adec702d4472e3252ca8b58af62247c
SHA135d1d2f90b80dca80ad398f411c93fe8aef07435
SHA2562b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335
SHA5127562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0
-
Filesize
18KB
MD5687fb5251718bed78c189f95ef55858d
SHA1b54c1463cef910776ba951a40369f1f9dbdeceb5
SHA25650fbf57804079db8d0913b1651985cfffd7fcb8fb0a8e75393f1f4ed1248a926
SHA5122a4102950ad8d0a336736d24bf6854cabd9742c279ad1e21f94101a02f9c04841e1539ee7b5bbb8a645324799b37fe2da8d519e0e73e54e44717307fd0144a36
-
Filesize
318B
MD5e008c3412c4d4b93ac92078866c069eb
SHA1ecc09219949f386152bb292c18cd4ee97bbbf2a7
SHA256d59d2f5ac6739824d9cb312df98ba6879b2d469ba69f417010d6ed9acf4bbe74
SHA512149fe0a322e5bc36d613a7ccc2ce31f9d6888ee8d7f84c31ee75d3aa1a8b96e5b6215fc5abfd066009cfddb22681affa15ce80ce005d14df56c03b87c9b6e8f9
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3.exe
Filesize780KB
MD5bf3c0ae824d16fe7f7811c4891b396eb
SHA1f2d93f02c5bf2c0a1888324ededf3221326631a3
SHA256355279a18f370b38ec5953f97100a0c3bfc21ef43d525f80def7f97b5f16b2a3
SHA512b56e9dead9d876b3b0c8d2195f5cc7964831e84aaf7856a6b5d623083e034d0d9f3f4e77c909b9b9d714d143bac43927f54960e93a7d6d0a770ad68fca5f8944
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.MSIL.Gen.gen-e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b.exe
Filesize360KB
MD5c7f2b17ebea905d355fe65f79ff4c6b2
SHA17e42a10a5a07867fdc1e1c30d62647a9006a3e8c
SHA256e14102c23aa4db48105d3a06697517c61413409b17dcca5cd23a449b156bfa3b
SHA512b93c27be91c4926bdf821782c58069d9f87c7d37ad04b21b52f60c980d2ea80fc0b70a1ef9b95a9b586b50f6ee04037b6a1ac7347723c8cf2691b4a98edae1d0
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Blocker.gen-f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb.exe
Filesize4.4MB
MD5e3e57157eeeef958f8be8a4b75748f94
SHA1cbc21c074ccfe11e4b5321e97510a8119e5f48a9
SHA256f7d0c3afdb6b73a9b8d9cde1f7476e5a8b1306dcb6f724eada83b9353f2f97fb
SHA5125905831766d776289d4b7fb3693f951a1f6fe772c15529795a1f69f2017ca5d970333012a55f716cc3b15f65f76282c65e015947ba82ee0a1917c62e3bfabb79
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Convagent.gen-d78d2ae644482d45196d92bcfc0b2d01788076010967a35c4673b836b4aca7ce.exe
Filesize1.1MB
MD591d3d1cd42a040259a1da060dfa380ef
SHA1ab1b751ca75a5bc2f88277ec33f3f40fc08f362d
SHA256d78d2ae644482d45196d92bcfc0b2d01788076010967a35c4673b836b4aca7ce
SHA512b44625202469ecdc529d0f7150d0e7c60813ee57d537bd9a723ce72340fbafd01eea3fa44eaf20a42917adf2cfac7712bd6a84334a81c88b33cfcbfefd18cf6c
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Cryptor.gen-50d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa.exe
Filesize261KB
MD5eeef6948548d308cc8dbd102e6148a42
SHA1078448017afa29d1892e7808ceb843cc15a0edba
SHA25650d0d2126c7d5723373d3b2ef3b5ad323c25e5b804f7ccf71fc832759ee6f5aa
SHA5127ed21ce659be62f7a1e50b0b51d79185cc7200b674dcee86bb28051677d714367665fa021f7b347272f6f7601bc7c8fb817b3994b9371f30601b426015aee248
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Encoder.gen-d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169.exe
Filesize201KB
MD54e77bd604d3dc88ae2f30a5e3023ace3
SHA1f5b1040e784d7004fecab5c28258b0f4336dd6de
SHA256d2683d68ef6b9bdff39eb7e8f4cc81a6d25cae92c7f540ad62befc0c417b6169
SHA512087545dabf0be3894dddab934d1d3f7c2ccacc965a6abc21422634989ec9de565046d7f34dda72727dfc6390d96b38bf893d9b6e49e8837495d035c5d950953f
-
C:\Users\Admin\Desktop\00367\HEUR-Trojan-Ransom.Win32.Sodin.vho-069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c.exe
Filesize158KB
MD5c9bf7216cdc2673bf4ee2af8b19bcfc8
SHA1ccf4b5f0ccab0d7d7d229f71086871b7dccfd4ee
SHA256069d993c71e2c78fd73fdef9ce4ced7fe0ce1b49f458a3ec3fae53208d382f3c
SHA51248fd3d958408602d2cf4f0ec8193d0a6c218d6f38c7543f2a5fdd2ee21e80d5dd9e7ce3f04ecd560a4a800f8824a97eb949ebf718c7db746296e591cd119f96c
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Blocker.dvjn-13fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660.exe
Filesize938KB
MD53b7fb763f772ab374bd5fc67fba62143
SHA1ef57e7e5c349b22a2c7dbac46b6fb4b828103aea
SHA25613fc9d7802032fbc07b700b8ea2b5ed77155aa0fd01b10ebdfb55077c3c3d660
SHA512579f560ef98c1685ba494d30470f8c3437b550586fb2962047aa369cc880cbfddd4a2d804f1af1cf07baec554ad00d4b168c5dc06b1d5b7edfd1ca7fae41e735
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Blocker.fpnf-5ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b.exe
Filesize6.5MB
MD54822191d2c59da45ff25a0387643bc8f
SHA142580049cc134e632a1365b7b1159271d335b04c
SHA2565ddf8b499bef537d70f04dd90287f4e0a7fd82bf7085713bc7b1ee5a7ce4ee2b
SHA512f2cccc95edfa26ec07d80fed51b31dec70cd8bc775ae5d79b0f9203cb26b564d85df111593c7b905112774c6db983d0c0249c7cb54a33dcd588784905879a6cd
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Blocker.kcwh-097b8e63a463b36ee4d257f90f2f966fd64f6b2113d09f4cb1c5193b88084caf.exe
Filesize84KB
MD58b001cb9226caa342aed47d1d1caf051
SHA15a7d96bc652cd6dcbc3bdb972cce369a61a4df24
SHA256097b8e63a463b36ee4d257f90f2f966fd64f6b2113d09f4cb1c5193b88084caf
SHA5120bee31f6b70685191af951dd07a6bba198ab7b6ab8750ffbdd81dc510f5d554f59ee789a3ea50065562d97d33a2edcebaf29c29a5125b9a89949aef1f55639be
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Crusis.to-4cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502.exe
Filesize92KB
MD536651e8d37129e065789f836cf353a08
SHA1c28e8f41b350410bf4e4f2e57cad6e51e6628f3e
SHA2564cdcebf5775260b399bf03fa7ab0312629b4475619aa6eef8ed0fb4bdcf24502
SHA5125c2cfca62ae7fa8c1b8b28130f126565b8e20c510ef326b7a3c65570e9f87706cc6145bb1f6911ed3e8b7ad533ddca6c0542783f755855502e6fcbb8754061b6
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Crypren.afmk-56ec95785f91418751ad5788f9076af108ae19e03d2e0c0551ae8f8d8f5acba4.exe
Filesize526KB
MD500d374f3142e46c53e621504e020dd86
SHA149c55f442702c3d96bf507f369676a54315851d0
SHA25656ec95785f91418751ad5788f9076af108ae19e03d2e0c0551ae8f8d8f5acba4
SHA512169149b510a6c502f90b18d518f10c7f0f1c7e426d62b2e90b8adfa87d76a0d1d8b819305fdb75231ac80d5fcac1dcf7982ed9e493f22dcf12ae203a0960edb9
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Foreign.oajg-2c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31.exe
Filesize752KB
MD58bc39d61f41a5c6dfac7ad4dc9e158c6
SHA11192620ceb20e80fcfdf93ef2b81e5e142d0a4cc
SHA2562c21e78c2ae52a2aedc97822579343b2f8e63455de97645d6dc52a50d3a2fe31
SHA5123b4e3bad2c14be164abf0b0b9e263bda2c349bafce2d19c93156d226f43df384882285b7cb5162f19c5645da9a242ea99108110135ff7fc362c9d3c943d92464
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.Foreign.ofyr-06e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf.exe
Filesize517KB
MD58351dfa45aebe443206cb5c7a01fb38f
SHA1db83f901fb4cc7e1b80ffa81873521a3df87cde5
SHA25606e8ba8006d3fb1e8d19b1f7730ade6112e132f703547cfee6d72a4d56f79acf
SHA51260929824cdacd89dfa97735610e8f7ca7aa7299052b8ee94efcf4117b129b51a34224df79ffe76a028f8dac0066a4cfb54fd25d6aa7cba8dc50d6a45c57e3581
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.ali-458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exe
Filesize239KB
MD514c7490547a7a901a79839a5252d22cb
SHA13d97a8672fcfaee10907f55b94a5a4db3591a62b
SHA256458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985
SHA5124d525200ba34a1de987804b15ffcc0aed4c133c4908ebafab0e79bd3135620de986a1e02e7896bcf30a4facbeb1aa4881b413ea4b804cd218fdd57ce3d96bd62
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.fdc-baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086.exe
Filesize660KB
MD5a98fd32bf6d793db872697aced08fbd3
SHA178dcb06cda307074b4cd364a0c966e1d8c1b7d75
SHA256baf095b733d2e6b4af5481d217b367403e3c6f8302eb4d51822b6fbe29144086
SHA5129ccf9e0d54e98bdc9594b267d6b181a3b1fb270519a952a61747ecce4bc9ff913b14701fc0338db9f039be98d29623971380b3b2cc1ac6070ef0a4ca9fc94c39
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.fmh-eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6.exe
Filesize206KB
MD556a22b5e5c3f94c1bd8b8eefb1d0ce8b
SHA1e77b2215fbcb05bff031ba40b5b3624425200634
SHA256eed71a70cbaf7d0e1ec48b866f7758c08d83ce2a3fdf06dc19b2a78a990900d6
SHA512f513d2ff3382dac2225ec6c1164023c28bb7e9767d2a7637de60cfd157e2b31e8827a2935cf4230936b97f6e95be2f5f2637a325c1bc2d169f4c2fe4790e0b29
-
C:\Users\Admin\Desktop\00367\Trojan-Ransom.Win32.GandCrypt.gzu-1f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590.exe
Filesize1.3MB
MD577999941c5c566dbc9c77f154103b0e9
SHA17f2afd00720fe1953fc7713c6b2f2c93a3943be8
SHA2561f6f620b2bc24b0c4fb84ca681981f85b312b0ba9d2b9964a6c5aaf2388f8590
SHA5125ee9c3c1bf52be2cb0307324730209cd986db47a3b36081bb624a4823fd9ca5e50f231ad87c6e15b428224abcc0ffb5fffe29197466f56f0c2008330a1745785
-
Filesize
8KB
MD5e2e47368983a54109700d5354c109f5b
SHA113c7b3187c12fcf34fff92a8d0e7604504bfaf2b
SHA25688e26f08f2eae74b9e44f7979f4c7fe856ed16d06fb2e62d7f4f847e801938f3
SHA51290b91c4496e58f14596194773badfd6ba05b705200fbef0efa99d6f2ed238b6c2641268ebc74a782fbe125a26d435a031e3458499ffa0b65fe82ad0e90342048
-
Filesize
99KB
MD51a3af12def6c8f6b8a7ab07c9dca1e2d
SHA1fbbf96cd6c9e4976f106c73293c8d3891574007c
SHA256074ee4bb81599c39fa9e42f665e38c03a6a7701cf7bb0643ce07c9d3d74a8d21
SHA5126508c8851468cf611dd7bae83538cacd4358531678e46a6fed98937b61eeaca6efc01e538a8cc63d94f0354899327abbc6a4cef85c601785ad75e2537a145f30
-
Filesize
8KB
MD5bac87049a7f02d130498d3cde71229bf
SHA1504f31c98f7a6b98ec93c1a2c96ac373005d9a90
SHA256eac89388ccb58069f923b20d3a5ca0f3e71e76f5ed6c42c063b1272946a37d67
SHA51213083b9e11b6735ad4ed038b0815bd8c0700dded796bac982d0495934289e882c155a0774fbdc4afe60863ad62088287f7b792e4fc562edadea991daa1b95886
-
Filesize
181KB
MD50c80a997d37d930e7317d6dac8bb7ae1
SHA1018f13dfa43e103801a69a20b1fab0d609ace8a5
SHA256a5dd2f97c6787c335b7807ff9b6966877e9dd811f9e26326837a7d2bd224de86
SHA512fe1caef6d727344c60df52380a6e4ab90ae1a8eb5f96d6054eced1b7734357ce080d944fa518cf1366e14c4c0bd9a41db679738a860800430034a75bb90e51a5
-
Filesize
880KB
MD57a5a53b9c62bfa71b166ab78743d67e0
SHA1ad2a3799a64f2f85460b73d0f3e1743fc383ec01
SHA256d5298e9a809749e9af0d5424f81f29d0088f3cdf169602f76f29d272f9adf798
SHA51201af9d8586a6eecfe32af888792110398b657f90afbf556edcaccd386b2a5c300f4afcec71ed76c588d5ef6a22fab7539d0e5628dd89dbff0f60639d730694cc
-
Filesize
1KB
MD55c0a698be9e7483ea8598635b729f1fc
SHA1348c237ebface112614b12def87d32eb21929292
SHA256fa7170caf95474472077ac6d1bb7fce5aae0fe43ca236912bf4b5ac6d6192763
SHA512abfeffcc042eefaba69dde11909db6b7b77fd70ea6f68bad49632ee7f9cf89c26c3b51b0816bb266597ce3521b3365a6b081d3baad90403bc32622e2dab982b6
-
Filesize
34KB
MD5f0345b2f09f6419c87256ca41210c65e
SHA1d70a0aca5459ca2a39c049d2a9505f9c51c41101
SHA256738059cbe25bb5fe5cb13ca4cea97364c6f7ea8a09e43c68dbf3ad35bd82807e
SHA51234b2311d5c623fe8109d7d5d745461d4bc2b9edf7a87d373d58825b7185c217e0cba7e8bb71046e99f0b9e9c92a5f467d18635213a2c9520e210144813ecf1b6
-
F:\$RECYCLE.BIN\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.id-CAB9F1C5.[[email protected]].bip
Filesize378B
MD58e54845b0c167312fc64ef645892ff89
SHA12e09df890ca2974a0ee6f3c4725839d6f2b33ee4
SHA2564d224ca26533b1ca9674b9d02889985bf2c9cae963f6767667015e4615d17518
SHA512d31aea54e8bd5049f5f831cfdfac8849b430d2e4b6c370497a5681ccd4c12353d219b014c8ed986f8c4f8003d584040d4126d7eb9b69f681fd0bca942821e4f1
-
F:\$RECYCLE.BIN\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.id-CAB9F1C5.[[email protected]].bip
Filesize881KB
MD57b09f92af94105f90c0474bd519ba56e
SHA13dadc11bc10de12dde407a6caa14646e911dda46
SHA256bf67f2ff07ba64392e655750388389426bba0da6b5025df4d09196b4b213aeb7
SHA5127c551cd87bd68e1b57942dc6725dfd70b443b0536b1f7afb60570b52ccdb29ca20c06f7e520af30b71168143c495faf78805f1afee227db397daa0c8003ed567
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47