Analysis
-
max time kernel
93s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:28
Static task
static1
General
-
Target
RNSM00365.7z
-
Size
21.2MB
-
MD5
3dcf38d6eb0239f2371910420c478d24
-
SHA1
db2fd304e4110b274df019eafdddb734a21c8a6e
-
SHA256
9d5387010b7383c83509798c3acc2228192602c93b54ab3b2a8bfb630a1347a8
-
SHA512
be720f8e324083417bc19814d529792bff223ed45e6ad9f6cc86df8a796cf9016183704c0155de955d9300c1cbec43f9aea2d826115e39d31bfd2ba874ae39fb
-
SSDEEP
393216:VKc/3fupUewDJCuZkv1vTFMI8+UkcHhuDIfaPv+vVMMyPqBoeu5/dwNX1/:V3H0U7kv1v2I8+WhuDIyXQVMJHGNF/
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\JKTHZ-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/82ee6a948478294f
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,,C:\\Program Files (x86)\\Microsoft\\RLknJOfi.exe" Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" BLrWjFlK.exe -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" BLrWjFlK.exe -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BLrWjFlK.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" BLrWjFlK.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (214) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (305) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (396) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
resource yara_rule behavioral1/files/0x000a000000023b97-806.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe -
Drops startup file 10 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fAbZBOUh.exe Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fAbZBOUh.exe BLrWjFlK.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fAbZBOUh.exe BLrWjFlK.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fAbZBOUh.exe Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe -
Executes dropped EXE 33 IoCs
pid Process 2092 HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe 3660 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe 5084 HEUR-Trojan-Ransom.MSIL.Crypren.gen-1cfbf371623499b7d638bc1274d4f58d88688c4f85104a9dedf2d07cf9d2907d.exe 2292 HEUR-Trojan-Ransom.MSIL.Encoder.gen-71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe 2284 HEUR-Trojan-Ransom.Win32.Crypmod.gen-8e5455de04f5969f678972b5a8cd7e4990c4dd09a10efdd3690a6ca78bd57e30.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 3924 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe 1388 HEUR-Trojan-Ransom.Win32.Generic-e8de0f06e4545ef56d98bf2377ff2cf4d85be2b212de88c2aeae53e89c99df2f.exe 1828 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe 1920 HEUR-Trojan-Ransom.Win32.Shade.gen-38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe 5008 winsvc.exe 4592 Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe 5016 Trojan-Ransom.Win32.Blocker.cfwh-b6d9e74bb63bfe8a7087e235121d22f8f49734020db762293b2ae9d036aee09b.exe 3220 launcher.exe 4256 Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe 1756 Trojan-Ransom.Win32.Blocker.jyqs-18a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c.exe 3464 Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe 1952 Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe 5000 Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe 1448 Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe 752 Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe 2024 Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe 1504 Trojan-Ransom.Win32.GandCrypt.huh-b40e5be24ebb96bfd11d12a972050b3af915fc86a5bd3f6a8545b82882491dfb.exe 5852 dope.exe 9484 Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe 6044 winsvcs.exe 7560 BLrWjFlK.exe 5760 BLrWjFlK.exe 4884 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe 5504 y_installer.exe 1612 Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe 8384 BD33F90AA0.exe 9688 HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe -
Loads dropped DLL 9 IoCs
pid Process 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 4592 Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe 4604 HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" BLrWjFlK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" BLrWjFlK.exe -
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nkYIjtsm = "C:\\Users\\Admin\\AppData\\Local\\Publishers\\LTeZeMZj.exe" BLrWjFlK.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleApps = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe" Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" HEUR-Trojan-Ransom.Win32.Shade.gen-38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe" Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BD33F90AA0 = "C:\\Users\\Admin\\AppData\\Roaming\\BD33F90AA0.exe" BD33F90AA0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nkYIjtsm = "C:\\Users\\Admin\\AppData\\Local\\Publishers\\LTeZeMZj.exe" Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*BD33F90AA0 = "C:\\Users\\Admin\\AppData\\Roaming\\BD33F90AA0.exe" Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service = "C:\\Windows\\T-57404750404665040\\winsvc.exe" HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service = "C:\\Windows\\T-57404750404665040\\winsvc.exe" HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dope = "\"C:\\Users\\Admin\\AppData\\Roaming\\dope.exe\" " Trojan-Ransom.Win32.Blocker.jyqs-18a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BD33F90AA0 = "C:\\Users\\Admin\\AppData\\Roaming\\BD33F90AA0.exe" Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*BD33F90AA0 = "C:\\Users\\Admin\\AppData\\Roaming\\BD33F90AA0.exe" BD33F90AA0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\prof2you = "\"C:\\Users\\Admin\\AppData\\Roaming\\prof2you\\launcher.exe\" 5000" Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\405068686303039040\\winsvcs.exe" Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\405068686303039040\\winsvcs.exe" Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BLrWjFlK.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened (read-only) \??\F: explorer.exe -
Drops autorun.inf file 1 TTPs 6 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened for modification C:\AUTORUN.INF Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe File opened for modification C:\AUTORUN.INF Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification F:\AUTORUN.INF Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification F:\AUTORUN.INF Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1448 set thread context of 9484 1448 Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe 141 PID 7560 set thread context of 5760 7560 BLrWjFlK.exe 147 PID 3660 set thread context of 4884 3660 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe 149 PID 1952 set thread context of 1612 1952 Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe 262 PID 2092 set thread context of 9688 2092 HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe 161 -
resource yara_rule behavioral1/memory/1920-752-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1920-777-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1920-776-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1920-778-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1920-787-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1920-792-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1920-3599-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/9484-5861-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/9484-5862-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/9484-5859-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1920-9572-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/9484-9579-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/5760-10429-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/5760-11287-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\MedTile.scale-200.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\vlc.mo.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\nb-no\ui-strings.js.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encoding.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailLargeTile.scale-400.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-80_altform-unplated_contrast-white.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-40_altform-unplated.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Dark.scale-250.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\ui-strings.js.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\plugin.js.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_SubTest-ppd.xrm-ms Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONLNTCOMLIB.DLL.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SUMIPNTG\SUMIPNTG.ELM.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\AppxManifest.xml Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-64_altform-unplated.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\equalizer_window.html Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Trial-pl.xrm-ms.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcor.dll.mui Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\JOURNAL\THMBNAIL.PNG.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\sunmscapi.dll Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Windows.dll Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluNoSearchResults_180x160.svg.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-40_altform-unplated.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-process-l1-1-0.dll Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_SubTest-pl.xrm-ms.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SyncFusion.Tools.Windows.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee.dll Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_contrast-white.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Linq.Queryable.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GARA.TTF Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Trial-pl.xrm-ms.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.ThreadPool.dll Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ppd.xrm-ms.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\ui-strings.js.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons.png.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\dkjson.luac.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageSmallTile.scale-125.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_2019.716.2316.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O17EnterpriseVL_Bypass30-ul-oob.xrm-ms.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.scale-400.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-time-l1-1-0.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluNoInternetConnection_120x80.svg.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Trial-ppd.xrm-ms Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ICE\THMBNAIL.PNG.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Light.scale-100.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\cstm_brand_preview2x.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ViewOnly_ZeroGrace-ppd.xrm-ms.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\zh-TW\msipc.dll.mui.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Generic-Light.scale-250.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_filetype_xd.svg.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\FetchingMail.scale-200.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ppd.xrm-ms.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Linq.Queryable.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\WindowsFormsIntegration.dll Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Threading.Tasks.Parallel.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\j2gss.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\libglinterop_dxva2_plugin.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-125.HCBlack.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dtplugin\npdeployJava1.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\Microsoft.VisualBasic.Forms.resources.dll.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\DemoNotebook.onepkg Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-100_contrast-white.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-200.png Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\ja-jp\ui-strings.js.id-8478294F.[[email protected]].bip Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe File opened for modification C:\Windows\405068686303039040\winsvcs.exe Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe File opened for modification C:\Windows\405068686303039040 Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe File opened for modification C:\Windows\T-57404750404665040\winsvc.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe File opened for modification C:\Windows\T-57404750404665040 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe File opened for modification C:\Windows\assembly Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe File created C:\Windows\assembly\Desktop.ini Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe File created C:\Windows\405068686303039040\winsvcs.exe Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe File created C:\Windows\T-57404750404665040\winsvc.exe HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1560 3924 WerFault.exe 109 4412 5008 WerFault.exe 113 3140 5016 WerFault.exe 119 10112 5000 WerFault.exe 128 3180 6044 WerFault.exe 142 8660 1612 WerFault.exe 152 9952 4884 WerFault.exe 149 9028 9688 WerFault.exe 161 -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.cfwh-b6d9e74bb63bfe8a7087e235121d22f8f49734020db762293b2ae9d036aee09b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypmod.gen-8e5455de04f5969f678972b5a8cd7e4990c4dd09a10efdd3690a6ca78bd57e30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLrWjFlK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dope.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLrWjFlK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.GandCrypt.huh-b40e5be24ebb96bfd11d12a972050b3af915fc86a5bd3f6a8545b82882491dfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jyqs-18a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.gen-71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-e8de0f06e4545ef56d98bf2377ff2cf4d85be2b212de88c2aeae53e89c99df2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 6064 setup.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b90-452.dat nsis_installer_1 behavioral1/files/0x000a000000023b90-452.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Bios HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 7220 vssadmin.exe 2824 vssadmin.exe 10468 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 8724 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3756129449-3121373848-4276368241-1000\{D59092A1-B032-4456-8713-8B859A5FB118} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 5076 powershell.exe 5076 powershell.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2732 7zFM.exe 1992 taskmgr.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 752 Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeRestorePrivilege 2732 7zFM.exe Token: 35 2732 7zFM.exe Token: SeSecurityPrivilege 2732 7zFM.exe Token: SeDebugPrivilege 3464 taskmgr.exe Token: SeSystemProfilePrivilege 3464 taskmgr.exe Token: SeCreateGlobalPrivilege 3464 taskmgr.exe Token: SeDebugPrivilege 1992 taskmgr.exe Token: SeSystemProfilePrivilege 1992 taskmgr.exe Token: SeCreateGlobalPrivilege 1992 taskmgr.exe Token: 33 3464 taskmgr.exe Token: SeIncBasePriorityPrivilege 3464 taskmgr.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 3660 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe Token: 33 3660 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe Token: SeIncBasePriorityPrivilege 3660 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe Token: SeDebugPrivilege 2292 HEUR-Trojan-Ransom.MSIL.Encoder.gen-71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe Token: SeDebugPrivilege 2092 HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe Token: SeSecurityPrivilege 9484 Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe Token: SeDebugPrivilege 9484 Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe Token: SeTcbPrivilege 9484 Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe Token: SeDebugPrivilege 4256 Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe Token: SeSecurityPrivilege 5760 BLrWjFlK.exe Token: SeDebugPrivilege 5760 BLrWjFlK.exe Token: SeTcbPrivilege 5760 BLrWjFlK.exe Token: SeBackupPrivilege 2396 vssvc.exe Token: SeRestorePrivilege 2396 vssvc.exe Token: SeAuditPrivilege 2396 vssvc.exe Token: SeDebugPrivilege 3464 Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe Token: SeShutdownPrivilege 9080 explorer.exe Token: SeCreatePagefilePrivilege 9080 explorer.exe Token: SeShutdownPrivilege 9080 explorer.exe Token: SeCreatePagefilePrivilege 9080 explorer.exe Token: SeShutdownPrivilege 9080 explorer.exe Token: SeCreatePagefilePrivilege 9080 explorer.exe Token: SeShutdownPrivilege 9080 explorer.exe Token: SeCreatePagefilePrivilege 9080 explorer.exe Token: SeShutdownPrivilege 9080 explorer.exe Token: SeCreatePagefilePrivilege 9080 explorer.exe Token: SeDebugPrivilege 8724 taskkill.exe Token: SeDebugPrivilege 8384 BD33F90AA0.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2732 7zFM.exe 2732 7zFM.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 3464 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe 1992 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 1992 3464 taskmgr.exe 96 PID 3464 wrote to memory of 1992 3464 taskmgr.exe 96 PID 5076 wrote to memory of 3844 5076 powershell.exe 101 PID 5076 wrote to memory of 3844 5076 powershell.exe 101 PID 3844 wrote to memory of 2092 3844 cmd.exe 102 PID 3844 wrote to memory of 2092 3844 cmd.exe 102 PID 3844 wrote to memory of 2092 3844 cmd.exe 102 PID 3844 wrote to memory of 3660 3844 cmd.exe 103 PID 3844 wrote to memory of 3660 3844 cmd.exe 103 PID 3844 wrote to memory of 3660 3844 cmd.exe 103 PID 3844 wrote to memory of 5084 3844 cmd.exe 104 PID 3844 wrote to memory of 5084 3844 cmd.exe 104 PID 3844 wrote to memory of 2292 3844 cmd.exe 105 PID 3844 wrote to memory of 2292 3844 cmd.exe 105 PID 3844 wrote to memory of 2292 3844 cmd.exe 105 PID 3844 wrote to memory of 2284 3844 cmd.exe 106 PID 3844 wrote to memory of 2284 3844 cmd.exe 106 PID 3844 wrote to memory of 2284 3844 cmd.exe 106 PID 3844 wrote to memory of 4604 3844 cmd.exe 107 PID 3844 wrote to memory of 4604 3844 cmd.exe 107 PID 3844 wrote to memory of 4604 3844 cmd.exe 107 PID 3844 wrote to memory of 3924 3844 cmd.exe 109 PID 3844 wrote to memory of 3924 3844 cmd.exe 109 PID 3844 wrote to memory of 3924 3844 cmd.exe 109 PID 3844 wrote to memory of 1388 3844 cmd.exe 110 PID 3844 wrote to memory of 1388 3844 cmd.exe 110 PID 3844 wrote to memory of 1388 3844 cmd.exe 110 PID 3844 wrote to memory of 1828 3844 cmd.exe 111 PID 3844 wrote to memory of 1828 3844 cmd.exe 111 PID 3844 wrote to memory of 1828 3844 cmd.exe 111 PID 3844 wrote to memory of 1920 3844 cmd.exe 112 PID 3844 wrote to memory of 1920 3844 cmd.exe 112 PID 3844 wrote to memory of 1920 3844 cmd.exe 112 PID 3924 wrote to memory of 5008 3924 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe 113 PID 3924 wrote to memory of 5008 3924 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe 113 PID 3924 wrote to memory of 5008 3924 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe 113 PID 3844 wrote to memory of 4592 3844 cmd.exe 114 PID 3844 wrote to memory of 4592 3844 cmd.exe 114 PID 3844 wrote to memory of 4592 3844 cmd.exe 114 PID 3844 wrote to memory of 5016 3844 cmd.exe 119 PID 3844 wrote to memory of 5016 3844 cmd.exe 119 PID 3844 wrote to memory of 5016 3844 cmd.exe 119 PID 4592 wrote to memory of 3220 4592 Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe 123 PID 4592 wrote to memory of 3220 4592 Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe 123 PID 4592 wrote to memory of 3220 4592 Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe 123 PID 3844 wrote to memory of 4256 3844 cmd.exe 124 PID 3844 wrote to memory of 4256 3844 cmd.exe 124 PID 3844 wrote to memory of 1756 3844 cmd.exe 125 PID 3844 wrote to memory of 1756 3844 cmd.exe 125 PID 3844 wrote to memory of 1756 3844 cmd.exe 125 PID 3844 wrote to memory of 3464 3844 cmd.exe 126 PID 3844 wrote to memory of 3464 3844 cmd.exe 126 PID 3844 wrote to memory of 1952 3844 cmd.exe 127 PID 3844 wrote to memory of 1952 3844 cmd.exe 127 PID 3844 wrote to memory of 1952 3844 cmd.exe 127 PID 3844 wrote to memory of 5000 3844 cmd.exe 128 PID 3844 wrote to memory of 5000 3844 cmd.exe 128 PID 3844 wrote to memory of 5000 3844 cmd.exe 128 PID 3844 wrote to memory of 1448 3844 cmd.exe 129 PID 3844 wrote to memory of 1448 3844 cmd.exe 129 PID 3844 wrote to memory of 1448 3844 cmd.exe 129 PID 3844 wrote to memory of 752 3844 cmd.exe 130 PID 3844 wrote to memory of 752 3844 cmd.exe 130 PID 3844 wrote to memory of 752 3844 cmd.exe 130 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BLrWjFlK.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00365.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2732
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exeHEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe"HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe"4⤵
- Executes dropped EXE
PID:9688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9688 -s 5005⤵
- Program crash
PID:9028
-
-
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe"HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe"4⤵
- Executes dropped EXE
- Enumerates system info in registry
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 14405⤵
- Program crash
PID:9952
-
-
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crypren.gen-1cfbf371623499b7d638bc1274d4f58d88688c4f85104a9dedf2d07cf9d2907d.exeHEUR-Trojan-Ransom.MSIL.Crypren.gen-1cfbf371623499b7d638bc1274d4f58d88688c4f85104a9dedf2d07cf9d2907d.exe3⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c vssadmin.exe delete shadows /all /quiet4⤵PID:5684
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:10468
-
-
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Encoder.gen-71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Crypmod.gen-8e5455de04f5969f678972b5a8cd7e4990c4dd09a10efdd3690a6ca78bd57e30.exeHEUR-Trojan-Ransom.Win32.Crypmod.gen-8e5455de04f5969f678972b5a8cd7e4990c4dd09a10efdd3690a6ca78bd57e30.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exeHEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --partner 351634 --distr /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5504 -
C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe"C:\Users\Admin\AppData\Local\Temp\7F4987FB1A6E43d69E3E94B29EB75926\YandexPackSetup.exe" /quiet /msicl "YABROWSER=y YAHOMEPAGE=y YAQSEARCH=y YABM=y VID=666"5⤵PID:7280
-
-
C:\Users\Admin\AppData\Local\Temp\y_installer.exeC:\Users\Admin\AppData\Local\Temp\y_installer.exe --stat dwnldr/p=351634/cnt=0/dt=5/ct=6/rt=0 --dh 2332 --st 17309970185⤵PID:1584
-
-
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\T-57404750404665040\winsvc.exeC:\Windows\T-57404750404665040\winsvc.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 5205⤵
- Program crash
PID:4412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 5924⤵
- Program crash
PID:1560
-
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Generic-e8de0f06e4545ef56d98bf2377ff2cf4d85be2b212de88c2aeae53e89c99df2f.exeHEUR-Trojan-Ransom.Win32.Generic-e8de0f06e4545ef56d98bf2377ff2cf4d85be2b212de88c2aeae53e89c99df2f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1388
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe3⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Shade.gen-38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exeHEUR-Trojan-Ransom.Win32.Shade.gen-38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exeTrojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Roaming\prof2you\launcher.exe"C:\Users\Admin\AppData\Roaming\prof2you\launcher.exe" 288000004⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3220
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.cfwh-b6d9e74bb63bfe8a7087e235121d22f8f49734020db762293b2ae9d036aee09b.exeTrojan-Ransom.Win32.Blocker.cfwh-b6d9e74bb63bfe8a7087e235121d22f8f49734020db762293b2ae9d036aee09b.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 5124⤵
- Program crash
PID:3140
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exeTrojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4256 -
C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:8384
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8724
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.jyqs-18a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c.exeTrojan-Ransom.Win32.Blocker.jyqs-18a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\Admin\AppData\Roaming\dope.exedope.exe C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.jyqs-18a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5852
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exeTrojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exeTrojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exeTrojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe4⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 765⤵
- Program crash
PID:8660
-
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exeTrojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\405068686303039040\winsvcs.exeC:\Windows\405068686303039040\winsvcs.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6044 -s 5285⤵
- Program crash
PID:3180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 5724⤵
- Program crash
PID:10112
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exeTrojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe"C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9484 -
C:\Users\Admin\AppData\Local\Temp\BLrWjFlK.exe"C:\Users\Admin\AppData\Local\Temp\BLrWjFlK.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7560 -
C:\Users\Admin\AppData\Local\Temp\BLrWjFlK.exe"C:\Users\Admin\AppData\Local\Temp\BLrWjFlK.exe"6⤵
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:5760
-
-
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exeTrojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:752 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:3800
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:2636
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:7220
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:6444
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:10152
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2824
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:7384
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:6816
-
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exeTrojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.GandCrypt.huh-b40e5be24ebb96bfd11d12a972050b3af915fc86a5bd3f6a8545b82882491dfb.exeTrojan-Ransom.Win32.GandCrypt.huh-b40e5be24ebb96bfd11d12a972050b3af915fc86a5bd3f6a8545b82882491dfb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:6736
-
-
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵PID:9092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3924 -ip 39241⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5008 -ip 50081⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5016 -ip 50161⤵PID:3892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5000 -ip 50001⤵PID:6108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6044 -ip 60441⤵PID:7352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1612 -ip 16121⤵PID:5200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2024 -ip 20241⤵PID:10448
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:9080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4884 -ip 48841⤵PID:6204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 9688 -ip 96881⤵PID:6376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:6344
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:11108
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:7640
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9C2AE4E14177D54725F7ECABE5D3F0052⤵PID:7592
-
C:\Users\Admin\AppData\Local\Temp\4D060AFC-CD6A-46C0-B80B-C9A139F86785\lite_installer.exe"C:\Users\Admin\AppData\Local\Temp\4D060AFC-CD6A-46C0-B80B-C9A139F86785\lite_installer.exe" --use-user-default-locale --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --YABROWSER3⤵PID:10740
-
-
C:\Users\Admin\AppData\Local\Temp\CDB3038C-43AF-413E-8816-E71CDAB0D6BB\seederexe.exe"C:\Users\Admin\AppData\Local\Temp\CDB3038C-43AF-413E-8816-E71CDAB0D6BB\seederexe.exe" "--yqs=y" "--yhp=y" "--ilight=" "--oem=" "--nopin=n" "--pin_custom=n" "--pin_desktop=n" "--pin_taskbar=y" "--locale=us" "--browser=y" "--browser_default=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\3EA6B834-018C-4BD4-A9FB-73CC9CE921FC\sender.exe" "--is_elevated=yes" "--ui_level=2" "--good_token=x" "--no_opera=n"3⤵PID:4064
-
C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent --pin-taskbar=y --pin-desktop=n4⤵PID:6476
-
C:\Users\Admin\AppData\Local\Temp\pin\explorer.exeC:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.exe --silent --pin-taskbar=y --pin-desktop=n /pin-path="C:\Users\Admin\AppData\Local\Yandex\YaPin\Yandex.lnk" --is-pinning5⤵PID:7560
-
-
-
C:\Users\Admin\AppData\Local\Temp\3EA6B834-018C-4BD4-A9FB-73CC9CE921FC\sender.exeC:\Users\Admin\AppData\Local\Temp\3EA6B834-018C-4BD4-A9FB-73CC9CE921FC\sender.exe --send "/status.xml?clid=1961774&uuid=5db7aa95-3a9b-41b3-bbe9-72eb8f9ccd52&vnt=Windows 10x64&file-no=8%0A10%0A11%0A12%0A13%0A17%0A18%0A20%0A21%0A22%0A25%0A36%0A40%0A42%0A43%0A57%0A61%0A89%0A102%0A103%0A123%0A124%0A125%0A129%0A"4⤵PID:8152
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10764
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6980
-
C:\Users\Admin\AppData\Roaming\prof2you\launcher.exe"C:\Users\Admin\AppData\Roaming\prof2you\launcher.exe" 50002⤵PID:3400
-
-
C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"2⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\{DD9D269C-2888-440A-B65D-8AF52D3B9304}.exe"C:\Users\Admin\AppData\Local\Temp\{DD9D269C-2888-440A-B65D-8AF52D3B9304}.exe" --job-name=yBrowserDownloader-{41557ECC-FF39-4D48-B565-EF0A4949C925} --send-statistics --local-path=C:\Users\Admin\AppData\Local\Temp\{DD9D269C-2888-440A-B65D-8AF52D3B9304}.exe --YABROWSER --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --silent --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={5db7aa95-3a9b-41b3-bbe9-72eb8f9ccd52} --use-user-default-locale2⤵PID:8032
-
C:\Users\Admin\AppData\Local\Temp\yb5EDF.tmp"C:\Users\Admin\AppData\Local\Temp\yb5EDF.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\d147ec7c-26d5-4022-8f7c-b0e6ff27b83d.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=592870664 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{41557ECC-FF39-4D48-B565-EF0A4949C925} --local-path="C:\Users\Admin\AppData\Local\Temp\{DD9D269C-2888-440A-B65D-8AF52D3B9304}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={5db7aa95-3a9b-41b3-bbe9-72eb8f9ccd52} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\fff5afc8-500c-445e-9aff-3bfeb753acb9.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"3⤵PID:9116
-
C:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\d147ec7c-26d5-4022-8f7c-b0e6ff27b83d.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=592870664 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{41557ECC-FF39-4D48-B565-EF0A4949C925} --local-path="C:\Users\Admin\AppData\Local\Temp\{DD9D269C-2888-440A-B65D-8AF52D3B9304}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={5db7aa95-3a9b-41b3-bbe9-72eb8f9ccd52} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\fff5afc8-500c-445e-9aff-3bfeb753acb9.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico"4⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\d147ec7c-26d5-4022-8f7c-b0e6ff27b83d.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/5/ --install-start-time-no-uac=592870664 --installer-brand-id=yandex --installer-partner-id=pseudoportal-ru --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --job-name=yBrowserDownloader-{41557ECC-FF39-4D48-B565-EF0A4949C925} --local-path="C:\Users\Admin\AppData\Local\Temp\{DD9D269C-2888-440A-B65D-8AF52D3B9304}.exe" --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=0 --remote-url=http://downloader.yandex.net/downloadable_soft/browser/pseudoportal-ru/Yandex.exe?clid=none&ui={5db7aa95-3a9b-41b3-bbe9-72eb8f9ccd52} --send-statistics --silent --source=lite --use-user-default-locale --variations-update-path="C:\Users\Admin\AppData\Local\Temp\fff5afc8-500c-445e-9aff-3bfeb753acb9.tmp" --verbose-logging --yabrowser --yandex-website-icon-file="C:\Users\Admin\AppData\Local\Temp\website.ico" --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=6121220315⤵
- System Time Discovery
PID:6064 -
C:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_534D5.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=6064 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x344,0x348,0x34c,0x340,0x350,0xfbcbe8,0xfbcbf4,0xfbcc006⤵PID:9696
-
-
C:\Windows\TEMP\sdwra_6064_1861261545\service_update.exe"C:\Windows\TEMP\sdwra_6064_1861261545\service_update.exe" --setup6⤵PID:6996
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --install7⤵PID:8620
-
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\clidmgr.exe" --appid=yabrowser --vendor-xml-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\source6064_493677291\Browser-bin\clids_yandex_second.xml"6⤵PID:11228
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --progress-window=0 --install-start-time-no-uac=5928706642⤵PID:4776
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exeC:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id= --annotation=main_process_pid=4776 --annotation=metrics_client_id=fc8ca869b20e4f6180567dfaf1198102 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x180,0x184,0x188,0x15c,0x18c,0x738d9a24,0x738d9a30,0x738d9a3c3⤵PID:3744
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --gpu-process-kind=sandboxed --field-trial-handle=2432,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2320 /prefetch:23⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id --brand-id=yandex --partner-id=pseudoportal-ru --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --gpu-process-kind=trampoline --field-trial-handle=2240,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2524 /prefetch:63⤵PID:7536
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=ru --service-sandbox-type=none --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Network Service" --field-trial-handle=2444,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=2684 --brver=24.10.2.705 /prefetch:33⤵PID:4080
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=ru --service-sandbox-type=service --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Storage Service" --field-trial-handle=2948,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3116 --brver=24.10.2.705 /prefetch:83⤵PID:6244
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=ru --service-sandbox-type=audio --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Audio Service" --field-trial-handle=3380,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3372 --brver=24.10.2.705 /prefetch:83⤵PID:6484
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=ru --service-sandbox-type=none --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Video Capture" --field-trial-handle=3740,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=3452 --brver=24.10.2.705 /prefetch:83⤵PID:7608
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --extension-process --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3872,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:23⤵PID:10056
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=3980,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4532 --brver=24.10.2.705 /prefetch:83⤵PID:5840
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=2436,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=4920 /prefetch:13⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=5180,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=5236 --brver=24.10.2.705 /prefetch:83⤵PID:5292
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5512,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:13⤵PID:9772
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=uwp_cookie_provider.mojom.UwpCookieProvider --lang=ru --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name=uwp_cookie_provider.mojom.UwpCookieProvider --field-trial-handle=5932,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=5920 --brver=24.10.2.705 /prefetch:83⤵PID:1672
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5896,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:13⤵PID:10000
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=ru --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --process-name="Data Decoder Service" --field-trial-handle=5828,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=6276 --brver=24.10.2.705 /prefetch:83⤵PID:8976
-
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe"C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id --brand-id=yandex --partner-id=pseudoportal-ru --help-url=https://api.browser.yandex.ru/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --ya-custo-process --enable-instaserp --video-capture-use-gpu-memory-buffer --lang=ru --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=2940,i,1202944062461300839,6851023224432700445,262144 --enable-features=InstallerNewIdentity2024 --variations-seed-version --mojo-platform-channel-handle=6400 /prefetch:13⤵PID:8956
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\#DECRYPT MY FILES#.txt2⤵PID:11096
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\#解密我的文件#.txt2⤵PID:11048
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:5504
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8456
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\a1313aedcfc94beaa1be8c19efd94e84 /t 10588 /p 73841⤵PID:8452
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\c39e409b086440b0aa13fcea83e744e6 /t 9452 /p 68161⤵PID:6360
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --run-as-service1⤵PID:9152
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=488dca4c15f9a1d330ad312b391a804e --annotation=main_process_pid=9152 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.10.2.705 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x98e784,0x98e790,0x98e79c2⤵PID:10456
-
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --update-scheduler2⤵PID:7160
-
C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe"C:\Program Files (x86)\Yandex\YandexBrowser\24.10.2.705\service_update.exe" --update-background-scheduler3⤵PID:5508
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:10212
-
C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"2⤵PID:1612
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:60
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1224
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5952
-
C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"2⤵PID:5488
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7580
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:7788
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:11252
-
C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"2⤵PID:6192
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10548
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9636
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5812
-
C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"2⤵PID:1444
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7692
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8484
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7472
-
C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"C:\Users\Admin\AppData\Roaming\BD33F90AA0.exe"2⤵PID:9316
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2752
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
2File Deletion
2Modify Registry
9Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5362da98e520e3d94a639b84f87c66cfd
SHA122c787b063125a52c34d9886b8d938584533ec03
SHA256bbf3068eb13e9ebf35bc5ccf876b02079a13a5e51bb507e0d5d5b9337ea76e5f
SHA512450670914627f1810ae94a7eb32d0262dfe620d50228665ff0efbbffee75ad1764e2bcbbadfc0e8b1ff47a4178d2b5630bb14ec2ebb1f0baa543fc97a067e248
-
Filesize
892KB
MD561962d139d680682591665b80b07ea05
SHA183c26b18edf150b991361493ebadc28cc0355eb3
SHA2566bd1bdbcce498dcc2b1d6315bc000e67c3d94ea486a6c04310b4f5df03966837
SHA5123ec3a1024bdc488120eb81017fb65bd1c406024581922c2d648606da121a47441153ed69db69c5bf6b83a492196afbd02f03f326c0fdb0f5da6c5258a165d6c4
-
Filesize
128KB
MD5959c52b8870be23f0ef3ce34c212513a
SHA1a00b5c027329554a06f9b399c0218337aff0c760
SHA256e36f11adf57436e26e06221975cb2dff5e80e34c79399fa8284911da5738449f
SHA51211dfe259ca2b477f64eb7b53e971655628c7f8f9ffad3d8536204eca1a67142441d19b9fd01a04b003323684b4b97442a7933ad45ef80bd7c6ffcc8766971178
-
Filesize
2.5MB
MD502d857ab9861d343a47a8ff486f7806d
SHA19972b45076389b77e7a54a28a0a257c1dd137ba7
SHA256c6f6842c1e3168e9dd12c8cddb9601ffb11cf9427e530e7137630876d5999282
SHA5120162518a42c101338a5ffa8209b997cc4e7bd1e8f81133a8da52d8e997c912c723b894dcbf179c339dadf9ff439589664ef9381c780cbceabcbd3d7577759141
-
Filesize
911B
MD56634f9f11bbf99139e4cde8cc4deb2ba
SHA1b6829ce21328f678f2b090a8ee8c61d0b980b0fd
SHA2565093ed18ce5e3ff7bb042b4616e220fc8de50f873af6b6c5d2515f780df9bddf
SHA512873689cf29ec7f3b76670cf061af2fbc89844c3f22ee25585ffd8b23c8607b00a69188945310be426a4efad4d738dfa8101554d1b89515c3f12d69ae8cfa3712
-
Filesize
2.4MB
MD5fc97164a5dddd55d2d1ac6cc6156771d
SHA1cf7953ef61fd18941d2f9c1599ad01d5d57dd987
SHA256778a127b88bb644a7c66d08932a446b85409fe7049bbae0dc15b9d364f2870f4
SHA512d7ca2fc40a6dde28a567f86b5beb87c867f01e6832d7a49eafa9b3987b7e9ee992f6d5104181f19888f6e0af45a7e90b17ebeae489e3956fd537ce1ba02bc79c
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe.id-8478294F.[[email protected]].bip
Filesize2.9MB
MD5e18d6449e55853a699c2c5d002992221
SHA112eb0188dc9c013e635186eed44109a5345fb896
SHA25621cf5e041a89c7889d6b3669793f41ed52f7d38e96ce7928dc68f43f1828dd09
SHA512fc1aa99ef764ba33e81d55709df347494a79fc7b2d3f6cc513578fea6ac5c2047ca954fe8b04ee0713124a760d058edfee80dac85183a8bdbc2ea25798816a67
-
Filesize
704B
MD52d64eea9ea75d125e256a2e4e96b1d63
SHA17885f086c3fa5e5d9011dff2b1a80fbe6a3821ec
SHA25607969c36a207e136b057e9cf77d3aef118de4853df3aa2b9562758a096eb5cb4
SHA5129f0687a11d7c612a0c4784fe1fd3c06c51d5fa6370db7563edfc0f379a6d5022d223ebb0d0e394deadc77ba66c47d902ca6f4953f67277b871c28ce4c7c7b2cd
-
Filesize
3KB
MD5b9d72e974cfdba3dac83404fe77a257a
SHA1f48028f7f12247cfbc8df2cfe00adb0d60cf89c0
SHA2563f57a0d6b75727cde25568af6c8bc2ff714fabff51a738efa108b8543f9e954a
SHA512adeef5b96211a457ae6cb397272873f309daf16f259a2345d4a2b31fda51a76bde2be5c97d3676f33fe6f376426a221e16b1a088fe0d7c040970d5723e8079b9
-
Filesize
4KB
MD5f0ff122ecd7ee559d58f5442547d957a
SHA1d8b4ea417304428b1f90058e9a71d8ebaa568693
SHA256a6b5af568a6e3db6454cfe9ea34901a0bbcd5449a68a95ee2ba6193978097527
SHA5127d6911faf6e9bc9cf13689f49deec0fd7257f2c229e95782f24b41ee671811757fc133e143fc5ce4a583765d051a7102f125d3027939659055b8d3a3c66f6fec
-
Filesize
696B
MD59eefa906b8f38f9be4b1a709f41c771b
SHA179010ed9d309c9c97d08e3a3af55b496d4aab3f7
SHA256f242e9236853485563f748e1b2e8c26fd76244997e7b4fbc294a588a10f8b414
SHA5122d2d0d21a9d5abb4beaa78ae31693a9d7a79b9fc1a287dfc071997950c1af6d18f70cac076fe68171df0d922f95c7747cd77edcbd119668ab19bf3e0f0e1de58
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log
Filesize16B
MD545eec7f3ff495bc6da615787d93ac679
SHA1e00bfad2efc5d0d79dfc4c3a642f92b01a1c29bb
SHA2564496cb52ba564ec32d0af9a2536d12e1c00e349a003f3006bdcbedcb9041cef4
SHA51206f570a6a390662c5ee560baa5e00e90ec8cc876ef121473ea2e3ff935df0e8e0bf1c97465eb452912eab1ae46dff744b352ee830d136f2b054982c2a5bd348b
-
Filesize
5KB
MD5a6f6261de61d910e0b828040414cee02
SHA1d9df5043d0405b3f5ddaacb74db36623dd3969dc
SHA2566bb91f1d74389b18bce6e71772e4c5573648c1a4823338193f700afdf8216be5
SHA51220cb7b646c160c942e379c6e7a1a8981a09f520361c0205052c1d66e2fdb76333ffaaf0ca1dfc779754f0e844b9946900fbd5690d01869e1607abc1fda6dffab
-
Filesize
332KB
MD50466ade7448b1998814052003c1cd084
SHA17376d8e082bb1c7c6fb62ce25adc7c2ccf7e14bd
SHA256ba7b39e181cb8da468b32f8315a54a54cf4d812fd91d3d7cb271f22e7e844a41
SHA512927e0d9d4972610ce626ac74a03bc70ffa1e18bcc2b2b052820d04afc6eb0fcaafcdddfd44cd05ccab3c23f3f160a551392b334bf22922b85b241d18abf50b60
-
Filesize
24KB
MD5416b88f944bba201237fd97de23b408c
SHA1be04bff753a99ed494ddc1af3168c72fa5204e48
SHA256317939dcbd1250768b104bc37fd846b6efda03f42973bb365b20540b4ff6b83e
SHA5124855c4949592a92bc12b7bf72adc659e1dc41ca18cc8285021d972100bf1a271542da1ba41731b7ec97c5edd33de2e6f686427b419c381a2b5a943eba6fd6042
-
Filesize
174B
MD5e0fd7e6b4853592ac9ac73df9d83783f
SHA12834e77dfa1269ddad948b87d88887e84179594a
SHA256feea416e5e5c8aa81416b81fb25132d1c18b010b02663a253338dbdfb066e122
SHA512289de77ffbe328388ad080129b7460712985d42076e78a3a545124881c30f564c5ef8fb4024d98903d88a6a187c60431a600f6ecbbe2888ee69e40a67ce77b55
-
Filesize
32B
MD566f8190bae15e3aa9dc4cb9dbc373904
SHA18fa890085f3af634fac5bb9a5e12a8ea132eb049
SHA2566e9b5605e08ad9b6f482d4febff71228a0ac340fcba0feda051b5b6dcc7f14dc
SHA512cdbe36afdf4363fd87e123c9b311dd5fcd357c7404900e4e045d8aabebfe84f40cbd079afbaf701a0e8469a2f82c163cdb3caf6fb4f31da0a94b2d3cb0bcf55f
-
Filesize
1024KB
MD53f3c08348497d4e4573237ce9a933186
SHA19f1693cf73f9b1a56a94f3fe68ac67bf28395157
SHA2562a336d53fc37e2b70c5ecae84425d45b069bcf815e534dd857658ecd146817a1
SHA512bba231f581e8546c056123fab5baec8c1c8fb35850e970bc37ff2c677f43b0a6c69ffff96ea19ed0a0d685c007fdbd4f51788a5d0241223f2482390734b694fd
-
Filesize
32B
MD5badad1b8fe9f65b88415789ad5c6a458
SHA1bfe7abb337cffe406905028f8907533cf446d6d3
SHA2566abbd44f1d46efe5ea74f808f489a20086298be2bd8d1cbbc2a9c63899ced1b8
SHA51298047d720852791cde1e01093a7253c1f9ef26f834cf32f8c357b388365a5e0102caedccf793bf644c22e37a667190b176491199c043ac9c0346cc296594da33
-
Filesize
32B
MD535f45b05ddba5e1bbbf326e511f7a436
SHA18d52b18ec90771a22b6036af7da59ce07b939582
SHA256ec8951f0baae816618f3d5089278710e4b2f72f8cd53304ac8299e1d3c762875
SHA5126ff83a8b9a6fe6943b7da777f1cf07e9aa8794c6f5257617867af8d4c69c3cb6aa558b57c9b7539bf8ecde3ed7a209906e858b9a4a2775fe5a09efb46fd4c905
-
Filesize
32B
MD562c269badc144350771616354f548b17
SHA13f688b7b1991ec2fbbab0ead90ae90f0517e3131
SHA25699ce20b7059058f8e44ca01560a25f9dec4377f9dacc4d98b087feec65940980
SHA51231b4421c351f71b9ebef4312ccbaf197a40e9a73205718b6659c3c9d4cedb535add24ca798334819bd7bdd537b9cca48253b89001095abc7aa60fec67f40e243
-
Filesize
32B
MD56ab0c73900d054c6284d07ec5cbed68b
SHA1515da0890055dfba07afcaa739e33e3228d654fa
SHA2561371db748b88de286a797305f1f8f280777ad52ea1661c451dc1993d6ae98b43
SHA5126f51c0e0fbbc0b8899fe31a4950652efebb765821899b8caae8b5220b0d6fa48f9b05cf669c7ca7afe830caf8ff370d02100cf26f9e2ee1b5d7a7223faa9015e
-
Filesize
32B
MD58dc20fb1d72b061ca901774c4fbe4089
SHA145aa88587b757755459252485f6fde80995989d1
SHA2563aefb10693a64087dd9948dd634370ce483053f03b234c2964c37144654764fb
SHA512b143bbc4246cb19b708d3da3b4d184136c69550767f5230c9f376498edac3bf5638c2b519d4fe99908ecd38b2bdb3a6dfef9010489687c614e077e7aff4b8354
-
Filesize
7KB
MD5dff211cdb68ec1415b4492b408f4cf9f
SHA1ec6c1269f124111c2cc690f1b20376937a604b4f
SHA256d1f0259b14075021945dd38b97c3039e6b6bf7b4b7ed2b278ba56581285cb816
SHA5124ba013257b48c6b04fe8232f1f6f02ba9a1d0d96ec01ffa6eda3d7e72e9c3fa0cfbdaa33c631aaf8258dca627dc93428fdff9386981cbd770a50b5d295f54f73
-
Filesize
32B
MD5eec00821c1a6c71b17e98776abffb255
SHA19de242205f516049ad744b77e0bd55e857f28b7b
SHA256640ddc714288a63d576af14f23a413d4a16a1484aed33390e877f1ec84cece8d
SHA512b9d362036e6ce9b15cb85b5b70fbb3d90011ef5235dc923429b29f300b146237e5ee4b6b6c4afce605488a908bcc8e1ad8b24641b5e3a02b9bdab38fb36777e7
-
Filesize
32B
MD514fd29028f625ed01fa20ed41828a484
SHA17b254bb8e0f7fe958834888a4fb1962976d3fd76
SHA2564033c7bdfe89bdcea261350b034c463277fcdb15c234e288d6577866223dafeb
SHA512280780e80b20d4a3addd529b6954b6ca51f8ca0dbb95fa0a28204139a9d74e08af0c6505acc94b8ebfce09ff1579ed0292aaf29e60c2677e54e327718c0c050c
-
Filesize
32B
MD5a000947eaa3b1269cbd614bf0fe498a9
SHA1f641278171e5f34dee20272a425d4a5467fed3a1
SHA256bb3df0a176de97162f8b1e8ecff1d3b4e89fe6e5cf2482a06532b0e4f625eb88
SHA5126c702f111a3b014c7be9272996739046c3000a202e7a3e63b59f59f617c3c8449d701499fd4d53904bbe59550060835d214f1e806cf45ccd8af5a84b4c08df29
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\M6JCG2RK\microsoft.windows[1].xml
Filesize97B
MD50046c81899a55c95633d0cb38d6ebe3f
SHA14794f4c6748c7242e8321f72baacce7cea09ae1d
SHA2562e555f2bd3569e20e0e6038edeb081e448034c6d1e8966029ffeacf1350ed950
SHA5120000ab3fa8b7d558521458bc02a024b972ecea5d1a753446b47ae29712825232dc9e3ca1708cb35bea5673d472689a03f4a357625ced9f9845109333f92d8d11
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\M6JCG2RK\microsoft.windows[1].xml
Filesize97B
MD5d1fe08db35d55ce26f709b414d324c94
SHA12a1c626a1dc221639b13d0dbf94625728689bfd0
SHA2565b5d259366f1c41a43bb4e876ff0b73ca4ac777e0f557edb9587514d6a3c4428
SHA512fcd11ccae56b8a7417b60a6e1b1214fc68e66d4a2112fd0af0dfce742414e5ffe4ef022b7296a53bb6906c23458a86f11e5e0b8ab140755ccaf66313fcf5c5b5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WindowsPowerShell_v1_0_powershell_exe
Filesize36KB
MD5949dd0f5804127d1c34ba36f7de7fe92
SHA14fb5c38be5357f352f21740cff6b2b764be92335
SHA256f15820f5920d9be873648342758cc8c89846321319b90c089fa6cfd6c857f6bf
SHA5127f55348bfcb2109c7222b160e511facc0a0bc7f58cb0da0056bffe985322ea7fbfa390c26bdc119a909740db573099a3fb947619839e3adcfb911e8d1547bac2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133754706317154768.txt
Filesize14KB
MD55da45b7fa6a711145935cfba93e28002
SHA1115d509b04d5abecb7de3e95972e8aef9dbbb358
SHA256076691e98c771c65e9cde3363bed52aa5bb16881f84d73e0c88180ad32487208
SHA512331eed033783f912cf53a78082a6bd20c65dd766632bca53631d338bc5d114415c909449c41a1ce07704651ed80166b7e026ca42ee79ab9600cebabad17a795e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133754706707092362.txt
Filesize2KB
MD5ecaea544af9da1114077b951d8cb520d
SHA15820b2d71e7b2543cf1804eb91716c4e9f732fde
SHA2569117b26ab2c8fdbb8223fe1f2d1770c50a6cf0d9849a5849d6aebcbe90435be6
SHA512dc7bedbc581818011aa2d313429f234b12e5e9cf320b02b8d7ceeaf9cdc1c921ffc51af7f4080b02740f2d2146fbb006ccbf37cdcba3e3a10009142daffdb919
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133754706903468806.txt
Filesize3KB
MD5e0dead59d3855f9b2c1fa87446fd5d3a
SHA1fe89011377ed2277255b6ec3cd9cc577d700b73e
SHA256e3ca599c7ba0716a6a3025a30baa0a498e3db91c73ec7a7fd5b30bcf0be0610b
SHA512aa005bdc4fe8cf792b7b5fc5a1219633ef9a47d94e64ec16ffbe542ba93ef676a325008ed10b05a8334f20e9d7fae72e489573937d4e3a85f61638cc5d0b7cc0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize2KB
MD5195940717292fe9d27b5f0d2ee96942b
SHA16d3f441c331683652e16050546f84fdb3a95b8f4
SHA25656b851c94c2dafd4c6e05075dcd5cd167ec3ac1b8aa4429c395def5ef4beb5d2
SHA51271485a2de59f2056db1be2b01b3486b0226d5cba025f95074446b9f263b75e803b2f852908a9ef7e8f205d39122e83d79bffba8527aef0678b48c21938ff1a1c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize6KB
MD5e7e21506446516bd23b25d401fc928b9
SHA1c00c34754b103ea6f8e08697548f54fb2af64385
SHA256c64a850996df628129b6b1c2c145ce9b61fc5fadfbe03c13bc056713f5e18e20
SHA5122929388eb63a7fdac121998fba8386ffbc7a30256c7e8a4254337a603389abf135a1e378d77723ad30c50948608220082b925b0dc592e6e7236ea5c7c5aa2631
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize6KB
MD5f219e9d499716b24d82ac062d8feee45
SHA16cd03f5a4a740168954cc23ff73260402ad94227
SHA25684e2066a1d4ba2e7c2932a093127d3f8ea4e999bc8a49010519b7b0ac3597bcc
SHA51234c55bccf77cfd7e13b4aad97a728fb536364c204b1884d1f1def43c0a773b8432fd651b6b6aaa3d0f2bbbc8394fe40edea3d72ef306c35cfb218c208f8194b0
-
Filesize
10.1MB
MD5e6d10b61b551b826819f52ac1dd1ea14
SHA1be2cdcba51f080764858ca7d8567710f2a692473
SHA25650d208224541ab66617323d8d791c06970a828eeb15b214965a5d88f6a093d41
SHA5120d5d98424bab24ccced9b73d5ed58851d320e0540963a3ccc14da6d6231b2413136fa11458dc2155bb5844af9e28f3a053f8b7f709a806a4070c5ff737fb0ac8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5ce49aae664173c6692bf0f53f5da193e
SHA1ea265d8d181ba67ada97e8b44ea0013011d636f5
SHA2568f4e004bd93202d84b6ab131fcff95a021d437a3ee38dbd7401c7ac4bf9e88f9
SHA512d1a096fccfbd6914e409c76e4f8149082223b8f4dfc7543a1c4fbb503302a114f70d32f098d3fee23549b8ba3f5e5ae1a8c83e965561a8f280f2b4127711bf3a
-
Filesize
4KB
MD5aa73d79096bf59a2df9f165a304ae3cf
SHA19e88d1719ec981d5d0a3529b479e0b21a6153b61
SHA2568b26582705d548173312abd353fd2f5578579b497880b31486ecfcbcac090fbb
SHA512cc7079b64f704fba0729e6b732623b596218328ee25e56184d9eb267ac1eff58e37fbf569c37386bacbf715bd6bf7067aac5602558a653dd8fd22e43ef3c0838
-
Filesize
14KB
MD527e49c2505a1c1d4d0cfb3a129a4e33b
SHA1e0ebb5cfa3f3967518ce227d1e6246fb8dc430c9
SHA25652894d81547e94a14236572079421fd3e144cd785c5ae7ae830f7f6db69760f0
SHA5127bc3cc5408d90f55b6c317d02cbe55bd78b7f0ab7b73a3baf66c3d0309a345a284be07a020bb4b7d5da8e10608a5eed816ccd4e7a018fdf3b9a9d48a86e8ea41
-
Filesize
189KB
MD5b18d1001e98ec00bfb8c802ce0fefe2a
SHA1a8fed86e4df6d790486a0db05d6b4e133d04ef8c
SHA256d6e1c2dcbb7d16bdd7e5082283603608159cf56800409e593d297ab47240dfe1
SHA512d07955cf8f84c3330d7990f7f553b0ac120a9bbbe02a918f5777a8667afe3f579aa10c743ec7d66d4b82e4f73df77abfd9305219e07d4ec9d432ff68519e61ca
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
16KB
MD5c8ffec7d9f2410dcbe25fe6744c06aad
SHA11d868cd6f06b4946d3f14b043733624ff413486f
SHA25650138c04dc8b09908d68abc43e6eb3ab81e25cbf4693d893189e51848424449f
SHA5124944c84894a26fee2dd926bf33fdf4523462a32c430cf1f76a0ce2567a47f985c79a2b97ceed92a04edab7b5678bfc50b4af89e0f2dded3b53b269f89e6b734b
-
Filesize
11KB
MD5da979fedc022c3d99289f2802ef9fe3b
SHA12080ceb9ae2c06ab32332b3e236b0a01616e4bba
SHA256d6d8f216f081f6c34ec3904ef635d1ed5ca9f5e3ec2e786295d84bc6997ddcaa
SHA512bd586d8a3b07052e84a4d8201945cf5906ee948a34806713543acd02191b559eb5c7910d0aff3ceab5d3b61bdf8741c749aea49743025dbaed5f4c0849c80be6
-
Filesize
14KB
MD5046074d285897c008499f7f3ad5be114
SHA1159040d616a056ee3498ec86debab58ef5036a55
SHA256254c5ccbce59ad882f7f51d0bf760cabde8c88c5af84e13cc8ad77ba0361055c
SHA512ab7436fda44e340dd5909ddec809c6b569a90d888529ef9320375e1aae7af85afcab8c1c1618551d3fe8d6ae727f7dca97aa8781b5555da759d501d2ccd749e1
-
Filesize
713B
MD529fd8aa74d93dd3733c357702e23ed8a
SHA1315d116c3898078fab2099a1f8ba5aa0ffca663f
SHA256493c57f0bbdaeb213bde1fde533cfea65acb91e6b5e19b2fc9af4556d18e7663
SHA512071c094c32e64cd45071faf122e0aabdb4062aff5b1902cd91f52566c4e88f7bd61608c9ed65c31781ae5754f6e1533f594cf1008318f2cbe934fcdc22c95645
-
Filesize
562B
MD534836cc47dfe21e789d39d0d1ce5aa0a
SHA14dccd26266913a37ee9e2e6860c2c31d4ef330eb
SHA2561009d8fa5131b1d5c55c3eeb31dfbc9fc7fa504874321275aed1630e2615ea5b
SHA5124004f13b1bcd2655cc66460d49c0dcb95fe582b62433f10c4e4a6c92a41623c70c11c3982672cbcba8f2b22e24040d9f2b60182821ae5964ccad58540cf6a29c
-
Filesize
510B
MD527bdb0864e3f7a9f6c61810adeaa9f53
SHA13c911d197a054a51a1ad444e3bcc4b634063597a
SHA2565981cca348493c670d47550ec9b201662046f5bb7c298af860c28814ff2f112f
SHA5120a4d78904c5efc0a2529b8d6f3e8e7001dd59807de8e9bd195e2f8a561b2e15de827dd65a74f7010f534f24df5fa2adb3e56074848878119955890feacde24ea
-
Filesize
5KB
MD500e5fcfd833151f7cbde607e2f7afeb4
SHA155839875c0947aafebff53d22ccc5dad29fe3563
SHA256b80192aaabe007baecd0603e3ce183e9d554b8a6b0411d20716acfa086ae3035
SHA512f056777a1987c3becdc217bdc2d82e6aa41086d38fddaa45c42f1726b6f7b7616a10918081650e825a724464ef148b669bc258d38a62e0de8642e2607a0b0de7
-
Filesize
8.7MB
MD56e358158ab5be3e47deff097020a2a42
SHA132cf029a0e15ddb01b0513fda4158addecadf9c9
SHA2568b979e74878e9f8c8b4cbb6bdbd0faf8321718a2ed32040daf28ac2bed365f7a
SHA512bc5abed9bf03274d9dad6c242cc9870bb5fdccc61f205ba18ee2d5c82f36c1ce7632aa2a94723bc65fc057ff383fcf01312f3d50bf7198c622b5e4aba9f7eebe
-
Filesize
2KB
MD5b1d39fcb7c7a290dc2cb670da1f3bfaa
SHA13b9dbc2c68ac7b929c0e4ee2b9eda77c993961e8
SHA2563ecdfa99ea0563df0ffbdd66c1490fe3e9d8c85bf229523d17dbb30e2f4b82cc
SHA51207558f2fc1042b4e50a9ee57bbe6fc6240bd4b39c0c59a750f1af893fdab85e2ff86f0ad64768eb715d510a0e8a3686be65ce271083eb28d635681dffd4fd383
-
Filesize
397KB
MD595828ee007d3586792d53ace50b2357e
SHA13501ccad7573fd467911f207155318db3a1a1554
SHA2568c4be5f1bc4e2f73d4396af48a31bf10362006472e9b28f40aa91f73a3815f12
SHA5129896eccb178fd772fc92e5793340bdbc1bd6169465d9a739df06c1154edbce16f6db5dd50df426ccbc40d8410d4ef170c3fb0bc700e7778149ff2168409638e7
-
Filesize
511B
MD557159192469222e505ee848e4955cacc
SHA1fe47b999e12b773e5bc2ade53489c45d54156d55
SHA2561dc0a8837b9aaf811f899dfa065e5592a98704da9537de1f943ae484737483f9
SHA512e16b2aa2f0da9ccd6a6df9a0a380d6baf0d5913efa7b3afa8514457d2269ba39cc6e177afe99358c750363387cec41682e59fe2e12695c63c826f4db5fec9608
-
Filesize
8KB
MD542a97368c30c3f21a3904a70b5ace40e
SHA1387abb2af67672b93ff9a5725a091e0856036c8a
SHA2568fbb24d7ef68e7ac56afe35feb24e37614f10d343a3a1b906e14d3e89c3e2e57
SHA512ff56ae8b1a7f137d183fdf5ac4c03836b5ada7cf91dc59ababaef211d02c4a390b39a216e8571187cb713331771e5f3ccaaf8f06436bef461a7e89467f73d8d5
-
Filesize
341B
MD5977bc7b2384ef1b3e78df8fbc3eeb16b
SHA17ee6110ca253005d738929b7ba0cc54ed2ed0a2e
SHA25682e288090168abe15419015317fd38f56c1136e7481f66656d84e0a2d861d4d6
SHA5124d154832ef3ac05abb1499a5bc8235d72f64cdaa3e6870206a6363c1d85d821604ae8a96850c2c8bd540d479b8dd5f3ce032472ed96bbf7eddb168ea3d2d1cf6
-
Filesize
3.8MB
MD572bc2a73b7ab14ffec64ad8fea21de44
SHA1dab9ce89b997b88956485b6659608405f1f96271
SHA256112f12480a3c98b47f5cb30bc547c2574c5c33d1f6412252c0d0f02b584812e8
SHA51246ed47de438821818bc41068d48efa9afb0ad99f4d74d32fe7ea3c269dd92d66db7b1710625592e119f3fbc7189f77e09f9ada6cbc9ae34ee6468c2bf1256329
-
Filesize
1KB
MD59d3fec2cebd324bb574feb1c830dd471
SHA189ea6347bad8d8422172af20bd49e0800f1d2325
SHA2563488fc40a74af66f0efcdc27e056a5e1d50106098ea5eb935b9aadcd4b39b9cc
SHA512ba383d91d3244b530ba1ed1829e1c5cfe01508b0cec0d981e82341b1793fad534ee10a62d645cc5c29035a8a08d5dd37a1b2994ab584f4626e86f1e9663c9fb5
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\Extensions\ghjgbemlcjioaaejhnnmgfpiplgalgcl.json
Filesize119B
MD52ec6275318f8bfcab1e2e36a03fd9ffa
SHA1063008acf0df2415f5bd28392d05b265427aac5c
SHA25620832de8163d5af0a0c8bda863bcd6083df4f92175d856ce527de1dae1f7c433
SHA5125eee4555be05d07bce49c9d89a1a64bb526b83e3ca6f06e2f9ef2094ad04c892110d43c25183da336989a00d05dad6ff5898ff59e2f0a69dcaaf0aa28f89a508
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_en.png
Filesize1KB
MD51376f5abbe56c563deead63daf51e4e9
SHA10c838e0bd129d83e56e072243c796470a6a1088d
SHA256c56ae312020aef1916a8a01d5a1fc67ed3b41e5da539c0f26632c904a5e49c62
SHA512a0bab3bae1307ea8c7ccbd558b86c9f40e748cdd6fd8067bb33eeef863191534af367a0058111553a2c3a24e666a99009176a8636c0a5db3bf1aa6226130498f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_en_2x.png
Filesize3KB
MD5900fdf32c590f77d11ad28bf322e3e60
SHA1310932b2b11f94e0249772d14d74871a1924b19f
SHA256fe20d86fd62a4d1ab51531b78231749bd5990c9221eab1e7958be6d6aef292d9
SHA51264ebc4c6a52440b4f9f05de8ffb343c2024c4690fe5c9f336e78cd1dd01ae8225e8bc446f386feb442e76136b20d6b04ee293467b21f5b294ce25e500922f453
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_ru.png
Filesize1KB
MD5ff321ebfe13e569bc61aee173257b3d7
SHA193c5951e26d4c0060f618cf57f19d6af67901151
SHA2561039ea2d254d536410588d30f302e6ab727d633cf08cb409caa5d22718af5e64
SHA512e98fbfb4ed40c5ac804b9f4d9f0c163508c319ec91f5d1e9deb6a5d3eada9338980f1b5fe11c49e6e88935ecd50119d321ce55ca5bdd0723a6e8c414e1e68e16
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\about_logo_ru_2x.png
Filesize3KB
MD5a6911c85bb22e4e33a66532b0ed1a26c
SHA1cbd2b98c55315ac6e44fb0352580174ed418db0a
SHA2565bb0977553ded973c818d43a178e5d9874b24539dacbd7904cd1871e0ba82b23
SHA512279fb0c1f2871ce41b250e9a4662046bc13c6678a79866eaf317cc93c997a683114122092214ce24f8e7f8a40520fe4ca03f54930148f4f794df0df3ecf74e9d
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\configs\all_zip
Filesize657KB
MD52c08a29b24104d4ae2976257924aa458
SHA1b318b5591c3c9e114991ff4a138a352fb06c8b54
SHA256b56d63a9d59d31d045d8b8bd9368a86080e0d2c0ef1dd92b6318682dc3766a85
SHA51211f71cadb24234f5e280c4c7d4a7bd53f655c4c7aa8c10118dbc665b8a34e2ec6530f22a86d976c7232f27e16976b53b06224e6b307a95b5b7ceaa0acc8e21c7
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\easylist\easylist.txt
Filesize620KB
MD58e4bcad511334a0d363fc9f0ece75993
SHA162d4b56e340464e1dc4344ae6cb596d258b8b5de
SHA2562f317fee439877eaadb1264bd3d1e153c963ef98596a4ccf227592aea12ae76f
SHA51265077bd249c51be198234ff927040ef849cd79adcd611ed2afae511bc2a257a21f13171bf01cb06fce788c1cff88c8ad39cf768c5900d77cd15453a35e7f0721
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\easylist\manifest.json
Filesize68B
MD515bcd6d3b8895b8e1934ef224c947df8
SHA1e4a7499779a256475d8748f6a00fb4580ac5d80d
SHA25677334f6256abddcc254f31854d1b00aa6743e20aadbb9e69187144847099a66b
SHA512c2d3778a99af8d8598e653593d5e2d1d0b3b2ace11addd2d3eeb2bf3b57d51bf938ddaf2d2743322e0ce02e291b81f61c319daf34c1cd604ffce1f6407a30b34
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\elokbjeafkcggjfjkakpchmcmhkhaofn\brand_settings.json
Filesize379B
MD5f70c4b106fa9bb31bc107314c40c8507
SHA12a39695d79294ce96ec33b36c03e843878397814
SHA2564940847c9b4787e466266f1bb921097abb4269d6d10c0d2f7327fde9f1b032b7
SHA512494dce5543e6dacc77d546015f4ea75fd2588625e13450dba7ba0bd4c2f548b28c746a0d42c7f9b20d37f92af6710927d4bccb2fee4faa17d3ec2c07ff547e70
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\fcgfaidpicddcilhjhafmmcgfodijhjd\brand_settings.json
Filesize316B
MD5a3779768809574f70dc2cba07517da14
SHA1ffd2343ed344718fa397bac5065f6133008159b8
SHA256de0fbb08708d4be7b9af181ec26f45fccd424e437bc0cfb5cf38f2604f01f7b2
SHA51262570be7ea7adee14b765d2af46fcd4dc8eec9d6274d9e00c5f361ff9b0cdb150305edad65a52b557c17dd9682e371004a471fa8958b0bd9cfbe42bb04ca5240
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\extension\gopnelejddjjkamjfblkcijjikkinnec\brand_settings.json
Filesize246B
MD530fdb583023f550b0f42fd4e547fea07
SHA1fcd6a87cfb7f719a401398a975957039e3fbb877
SHA256114fd03aa5ef1320f6cc586e920031cf5595a0d055218ce30571ff33417806d3
SHA512bae328e1be15c368f75396d031364bef170cfcf95dbdf4d78be98cff2b37a174d3f7ebb85b6e9eb915bb6269898cbcecd8a8415dc005c4444175fe0447126395
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\import-bg.png
Filesize9KB
MD585756c1b6811c5c527b16c9868d3b777
SHA1b473844783d4b5a694b71f44ffb6f66a43f49a45
SHA2567573af31ed2bfcfff97ed2132237db65f05aff36637cd4bdeccdf8ca02cd9038
SHA5121709222e696c392ca7bcd360f9a2b301896898eb83ddfb6a9db0d0c226a03f50671633b8bed4d060d8f70df7282ffc2cd7ab1d1449acf2e07a7b6c251aa3a19e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\dictionary-ru-RU.mrf
Filesize1.1MB
MD50be7417225caaa3c7c3fe03c6e9c2447
SHA1ff3a8156e955c96cce6f87c89a282034787ef812
SHA2561585b1599418d790da830ef11e8eeceee0cbb038876fe3959cc41858bd501dbc
SHA512dfc0de77b717029a8c365146522580ab9d94e4b2327cef24db8f6535479790505c337852d0e924fbfa26e756b3aec911f27f5f17eba824496365c9a526464072
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\dictionary-ru-RU.mrf.sig
Filesize256B
MD5d704b5744ddc826c0429dc7f39bc6208
SHA192a7ace56fb726bf7ea06232debe10e0f022bd57
SHA256151739137bbbdf5f9608a82ec648bdf5d7454a81b86631b53dfc5ad602b207d6
SHA5121c01217e3480872a6d0f595ceb1b2242ffe3e1ff8b3fdd76eea13a7541606b94d3ccd69492a88220e0e40c17da5d785e4dba1d7501e6be749b9c46f72572ef6f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\morphology\stop-words-ru-RU.list
Filesize52B
MD524281b7d32717473e29ffab5d5f25247
SHA1aa1ae9c235504706891fd34bd172763d4ab122f6
SHA256cbeec72666668a12ab6579ae0f45ccbdbe3d29ee9a862916f8c9793e2cf55552
SHA5122f81c87358795640c5724cfabcabe3a4c19e5188cedeab1bd993c8ccfc91c9c63a63e77ac51b257496016027d8bccb779bd766174fa7ea2d744bd2e2c109cb8b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\safebrowsing\download.png
Filesize437B
MD5528381b1f5230703b612b68402c1b587
SHA1c29228966880e1a06df466d437ec90d1cac5bf2e
SHA2563129d9eaba1c5f31302c2563ebfa85747eda7a6d3f95602de6b01b34e4369f04
SHA5129eb45b0d4e3480a2d51a27ac5a6f20b9ef4e12bf8ac608043a5f01a372db5ea41a628458f7a0b02aaba94cd6bb8355a583d17666f87c3f29e82a0b899e9700bd
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\sxs.ico
Filesize43KB
MD5592b848cb2b777f2acd889d5e1aae9a1
SHA12753e9021579d24b4228f0697ae4cc326aeb1812
SHA256ad566a3e6f8524c705844e95a402cdeb4d6eed36c241c183147409a44e97ebcd
SHA512c9552f4db4b6c02707d72b6f67c2a11f1cf110b2c4ac5a1b7ac78291a14bf6eb35a9b4a05bc51ac80135504cd9dcad2d7a883249ee2e20a256cb9e9ceeb0032f
-
Filesize
617KB
MD558697e15ca12a7906e62fc750e4d6484
SHA1c5213072c79a2d3ffe5e24793c725268232f83ab
SHA2561313aa26cc9f7bd0f2759cfaff9052159975551618cba0a90f29f15c5387cad4
SHA512196b20d37509ea535889ec13c486f7ee131d6559fb91b95de7fdd739d380c130298d059148c49bf5808d8528d56234c589c9d420d63264f487f283f67a70c9a6
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\1-1x.png
Filesize18KB
MD580121a47bf1bb2f76c9011e28c4f8952
SHA1a5a814bafe586bc32b7d5d4634cd2e581351f15c
SHA256a62f9fdf3de1172988e01a989bf7a2344550f2f05a3ac0e6dc0ccd39ed1a697e
SHA512a04df34e61fd30764cf344b339ba2636b9280a358863f298690f6a8533c5e5dfa9773a14f8d16a5bb709ea17cf75e1da6302335aa9120009892e529bfad30df9
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\abstract\light.jpg
Filesize536KB
MD53bf3da7f6d26223edf5567ee9343cd57
SHA150b8deaf89c88e23ef59edbb972c233df53498a2
SHA2562e6f376222299f8142ff330e457867bad3300b21d96daec53579bf011629b896
SHA512fef8e951c6cf5cec82dbeafd306de3ad46fd0d90e3f41dcea2a6046c95ab1ae39bf8a6e4a696580246c11330d712d4e6e8757ba24bbf180eec1e98a4aec1583b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\abstract\light_preview.jpg
Filesize5KB
MD59f6a43a5a7a5c4c7c7f9768249cbcb63
SHA136043c3244d9f76f27d2ff2d4c91c20b35e4452a
SHA256add61971c87104187ae89e50cec62a196d6f8908315e85e76e16983539fba04b
SHA51256d7bd72c8a380099309c36912513bcafbe1970830b000a1b89256aae20137c88e1e281f2455bb381ab120d682d6853d1ef05d8c57dd68a81a24b7a2a8d61387
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\custogray_full.png
Filesize313B
MD555841c472563c3030e78fcf241df7138
SHA169f9a73b0a6aaafa41cecff40b775a50e36adc90
SHA256a7cd964345c3d15840b88fd9bc88f0d0c34a18edbf1ce39359af4582d1d7da45
SHA512f7433d17937342d9d44aa86bcc30db9ae90450b84aa745d2c7390ff430449e195b693a8ae6df35d05fee2d97149a58a7d881737d57902d9885c6c55393d25d6f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\preview.png
Filesize136B
MD50474a1a6ea2aac549523f5b309f62bff
SHA1cc4acf26a804706abe5500dc8565d8dfda237c91
SHA25655a236ad63d00d665b86ff7f91f2076226d5ed62b9d9e8f835f7cb998556545f
SHA512d8e3de4fea62b29fd719376d33a65367a3a2a2a22ed175cc1eeff3e38dfbaac448c97a6fbea55bc6159351d11a6aad97e09cb12548cf297e01bd23bf6074de08
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\custogray\wallpaper.json
Filesize233B
MD5662f166f95f39486f7400fdc16625caa
SHA16b6081a0d3aa322163034c1d99f1db0566bfc838
SHA2564cd690fb8ed5cd733a9c84d80d20d173496617e8dde6fca19e8a430517349ed5
SHA512360a175c5e72ff8d2a01ee4e0f365237bbd725b695139ea54afc905e9e57686c5db8864b5abf31373a9cb475adcbdb3db292daf0a53c6eb643a5d61b868ad39b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\fir_tree\fir_tree_preview.png
Filesize8KB
MD5d6305ea5eb41ef548aa560e7c2c5c854
SHA14d7d24befe83f892fb28a00cf2c4121aeb2d9c5d
SHA2564c2b561cf301d9e98383d084a200deb7555ec47a92772a94453d3d8d1de04080
SHA5129330009997d62c1804f1e4cf575345016cda8d6a1dd6cb7d2501df65ea2021df6b8a5bc26809ddfc84e6ff9450f1e404c135561b1b00b9e4915c69e84f89cfec
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\fir_tree\wallpaper.json
Filesize384B
MD58a2f19a330d46083231ef031eb5a3749
SHA181114f2e7bf2e9b13e177f5159129c3303571938
SHA2562cc83bc391587b7fe5ddd387506c3f51840b806f547d203ccd90487753b782f1
SHA512635828e7b6044eeede08e3d2bb2e68bc0dbbe9e14691a9fb6e2bc9a2ac96526d8b39c8e22918ff2d944fb07b2531077f8febd43028be8213aa2fad858b6ee116
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\flowers\flowers_preview.png
Filesize9KB
MD5ba6e7c6e6cf1d89231ec7ace18e32661
SHA1b8cba24211f2e3f280e841398ef4dcc48230af66
SHA25670a7a65aa6e8279a1a45d93750088965b65ea8e900c5b155089ca119425df003
SHA5121a532c232dd151474fbc25e1b435a5e0d9d3f61372036d97bcaab3c352e7037f1c424b54a8904ef52cf34c13a77b7ab295fb4fd006c3ab86289577f469a6cd4c
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\flowers\wallpaper.json
Filesize387B
MD5a0ef93341ffbe93762fd707ef00c841c
SHA17b7452fd8f80ddd8fa40fc4dcb7b4c69e4de71a0
SHA25670c8d348f7f3385ac638956a23ef467da2769cb48e28df105d10a0561a8acb9e
SHA512a40b5f7bd4c2f5e97434d965ef79eed1f496274278f7caf72374989ac795c9b87ead49896a7c9cbcac2346d91a50a9e273669296da78ee1d96d119b87a7ae66a
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan.jpg
Filesize211KB
MD5c51eed480a92977f001a459aa554595a
SHA10862f95662cff73b8b57738dfaca7c61de579125
SHA256713c9e03aac760a11e51b833d7e1c9013759990b9b458363a856fd29ea108eec
SHA5126f896c5f7f05524d05f90dc45914478a2f7509ea79114f240396791f658e2f7070e783fab6ac284327361dc2a48c5918b9f1c969b90795ceacce2c5c5bfa56ca
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan.webm
Filesize9.6MB
MD5b78f2fd03c421aa82b630e86e4619321
SHA10d07bfbaa80b9555e6eaa9f301395c5db99dde25
SHA25605e7170852a344e2f3288fc3b74c84012c3d51fb7ad7d25a15e71b2b574bfd56
SHA512404fb2b76e5b549cbcba0a8cf744b750068cbd8d0f9f6959c4f883b35bcaa92d46b0df454719ca1cef22f5924d1243ba2a677b2f86a239d20bfad5365dc08650
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\huangshan\huangshan_preview.jpg
Filesize26KB
MD51edab3f1f952372eb1e3b8b1ea5fd0cf
SHA1aeb7edc3503585512c9843481362dca079ac7e4a
SHA256649c55ccc096cc37dfe534f992b1c7bda68da589258611924d3f6172d0680212
SHA512ecd9609fbf821239ddcbdc18ef69dade6e32efd10c383d79e0db39389fa890a5c2c6db430a01b49a44d5fa185f8197dbbde2e1e946f12a1f97a8c118634c0c34
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\meadow\preview.png
Filesize5KB
MD5d10bda5b0d078308c50190f4f7a7f457
SHA13f51aae42778b8280cd9d5aa12275b9386003665
SHA2560499c4cc77a64cc89055b3c65d7af8387f5d42399ff2c0a2622eccbd6d481238
SHA512668e1a70a50a0decf633167ac23cba6916d0e05d0894daae1f7e3d487519f0a126abd4298430b38f52746a5c3b83ccd520b3d9b0ae1a79f893e36821a0458566
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\meadow\wallpaper.json
Filesize439B
MD5f3673bcc0e12e88f500ed9a94b61c88c
SHA1e96e2b2b5c9de451d76742f04cc8a74b5d9a11c0
SHA256c6581e9f59646e0a51a3194798ec994c7c5c99f28897108838aaf4a4e2bda04a
SHA51283fb3fe4a3562449a53c13d1c38d5fe9ef1fa55c3006f59b65eace9a6ad4963e768088bc500dbe5266b5979c6ace77874ef11a15a7bd9fabae00ff137e70ecb5
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\misty_forest\preview.png
Filesize5KB
MD577aa87c90d28fbbd0a5cd358bd673204
SHA15813d5759e4010cc21464fcba232d1ba0285da12
SHA256ea340a389af6d7ad760dff2016cf4e79488bda1a45d0a415b3cd02a4430c9711
SHA512759519b8822a6a4b88fc9ba47fa9d5d898b2f5a0f359acfbefc04809e6d7f5df86fb130f191eb6f63322792a18c0e7170aedf3ce7060fd9ad7e1bec2e686c3b2
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\misty_forest\wallpaper.json
Filesize423B
MD52b65eb8cc132df37c4e673ff119fb520
SHA1a59f9abf3db2880593962a3064e61660944fa2de
SHA256ebe9cadad41bd573f4b5d20e3e251410300b1695dfdf8b1f1f1276d0f0f8fa6d
SHA512c85fe6895453d0c38a1b393307b52d828bad8fa60d1d65bb83ffa3c5e17b71aa13cab60955489198503839ce5a4a6c1bb353752ab107f5e5b97908116c987e52
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\mountains_preview.jpg
Filesize35KB
MD5a3272b575aa5f7c1af8eea19074665d1
SHA1d4e3def9a37e9408c3a348867169fe573050f943
SHA25655074794869b59cd5c693dfa6f6615aea068c2cd50cdae6dd69bd0410661ded8
SHA512c69bf39362658dd6cbd827cf6db0f188a9c4410b3c6b7b532595fd5907974e2141d857942ffb2497282e31eaa33c71240c2c2bd8721046df55e3358e8b76c061
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_dark\neuro_dark_preview.jpg
Filesize24KB
MD529c69a5650cab81375e6a64e3197a1ea
SHA15a9d17bd18180ef9145e2f7d4b9a2188262417d1
SHA256462614d8d683691842bdfb437f50bfdea3c8e05ad0d5dac05b1012462d8b4f66
SHA5126d287be30edcb553657e68aef0abc7932dc636306afed3d24354f054382852f0064c96bebb7ae12315e84aab1f0fd176672f07b0a6b8901f60141b1042b8d0be
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_dark\neuro_dark_static.jpg
Filesize2.4MB
MD5e6f09f71de38ed2262fd859445c97c21
SHA1486d44dae3e9623273c6aca5777891c2b977406f
SHA256a274d201df6c2e612b7fa5622327fd1c7ad6363f69a4e5ca376081b8e1346b86
SHA512f6060b78c02e4028ac6903b820054db784b4e63c255bfbdc2c0db0d5a6abc17ff0cb50c82e589746491e8a0ea34fd076628bbcf0e75fa98b4647335417f6c1b7
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_light\neuro_light_preview.jpg
Filesize13KB
MD5d72d6a270b910e1e983aa29609a18a21
SHA1f1f8c4a01d0125fea1030e0cf3366e99a3868184
SHA256031f129cb5bab4909e156202f195a95fa571949faa33e64fe5ff7a6f3ee3c6b3
SHA51296151c80aac20dbad5021386e23132b5c91159355b49b0235a82ca7d3f75312cfea9a2158479ebc99878728598b7316b413b517b681486105538bbeb7490b9c2
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\neuro_light\neuro_light_static.jpg
Filesize726KB
MD59c71dbde6af8a753ba1d0d238b2b9185
SHA14d3491fa6b0e26b1924b3c49090f03bdb225d915
SHA256111f666d5d5c3ffbcb774403df5267d2fd816bdf197212af3ac7981c54721d2e
SHA5129529a573013038614cd016a885af09a5a06f4d201205258a87a5008676746c4082d1c4a52341d73f7c32c47135763de6d8f86760a3d904336f4661e65934077e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\peak\preview.png
Filesize5KB
MD51d62921f4efbcaecd5de492534863828
SHA106e10e044e0d46cd6dccbcd4bae6fb9a77f8be45
SHA256f72ea12f6c972edfe3d5a203e1e42cbbaf4985633de419342c2af31363f33dab
SHA512eec8171bd3bea92e24066e36801f334ac93905b7e8e50935f360e09fa8c9b9f848c4c62b687299e8297c0693d6dbaf9c6035b471e6345d626510b73e3606ee4d
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\peak\wallpaper.json
Filesize440B
MD5f0ac84f70f003c4e4aff7cccb902e7c6
SHA12d3267ff12a1a823664203ed766d0a833f25ad93
SHA256e491962b42c3f97649afec56ad4ea78fd49845ceb15f36edddd08d9e43698658
SHA51275e048c1d1db6618ead9b1285846922c16a46ee138a511e21235342a5a6452c467b906578bdd4a56e7b9e0a26535df6fb6319ae1cae238055887b48963fa6ed6
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\raindrops\raindrops_preview.png
Filesize7KB
MD528b10d683479dcbf08f30b63e2269510
SHA161f35e43425b7411d3fbb93938407365efbd1790
SHA2561e70fc9965939f6011488f81cd325223f17b07ee158a93c32c124602b506aa6b
SHA51205e5b5e9c5ef61f33a883b0286c2239cb2a464581d6e8a86d7b179b1887b4cb2cd7304e0821cdd3208501421c44c63c248a5166c790792717a90f8ac528fbf2f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\raindrops\wallpaper.json
Filesize385B
MD55f18d6878646091047fec1e62c4708b7
SHA13f906f68b22a291a3b9f7528517d664a65c85cda
SHA256bcfea0bebf30ee9744821a61fcce6df0222c1a266e0995b9a8cfbb9156eeeefd
SHA512893b2077a4abaa2fe89676c89f5e428ccd2420177268159395b5568824dd3fe08bea8a8b2f828c6c9297b19e0f8e3a1b7899315c0b07f4b61fc86ce94301518b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea.webm
Filesize12.5MB
MD500756df0dfaa14e2f246493bd87cb251
SHA139ce8b45f484a5e3aa997b8c8f3ad174e482b1b9
SHA256fa8d0ae53ebdbec47b533239709b7e1514ecb71278907621ca2d288241eb0b13
SHA512967670863f3c77af26fa1d44cd7b4fe78148d2ba6ea930b7b29b9f35d606554d664c0577068e0c26fa125d54627d7e7543360bce4acee0af17783b07450b5f52
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea\sea_preview.png
Filesize3KB
MD53c0d06da1b5db81ea2f1871e33730204
SHA133a17623183376735d04337857fae74bcb772167
SHA25602d8e450f03129936a08b67f3a50ea5d2e79f32c4e8f24d34b464f2cb5e0b086
SHA512ff0e60c94fc3c0c61d356a26667c5170256e1143b29adf23d4e7d27012da72ed8865ef59dc2046314c7335b8d3d331e5fd78f38b9b92f6af48729dae80f85b15
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea\wallpaper.json
Filesize379B
MD592e86315b9949404698d81b2c21c0c96
SHA14e3fb8ecf2a5c15141bb324ada92c5c004fb5c93
SHA256c2bb1e5d842c7e5b1b318f6eb7fe1ce24a8209661ddd5a83ab051217ca7c3f65
SHA5122834b1ef7bb70b2d24c4fedef87cd32c6e8f401d8ee5f3852808f6a557724ce036c31a71298cd0ed601cde4be59ec4042542351c63c4e0ac3d31419f79240956
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea_preview.jpg
Filesize59KB
MD553ba159f3391558f90f88816c34eacc3
SHA10669f66168a43f35c2c6a686ce1415508318574d
SHA256f60c331f1336b891a44aeff7cc3429c5c6014007028ad81cca53441c5c6b293e
SHA51294c82f78df95061bcfa5a3c7b6b7bf0b9fb90e33ea3e034f4620836309fb915186da929b0c38aa3d835e60ea632fafd683623f44c41e72a879baf19de9561179
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\sea_static.jpg
Filesize300KB
MD55e1d673daa7286af82eb4946047fe465
SHA102370e69f2a43562f367aa543e23c2750df3f001
SHA2561605169330d8052d726500a2605da63b30613ac743a7fbfb04e503a4056c4e8a
SHA51203f4abc1eb45a66ff3dcbb5618307867a85f7c5d941444c2c1e83163752d4863c5fc06a92831b88c66435e689cdfccdc226472be3fdef6d9cb921871156a0828
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\stars\preview.png
Filesize6KB
MD5ed9839039b42c2bf8ac33c09f941d698
SHA1822e8df6bfee8df670b9094f47603cf878b4b3ed
SHA2564fa185f67eaf3a65b991cea723d11f78de15a6a9a5235848a6456b98a9d7f689
SHA51285119055ddfc6bc4cca05de034b941b1743cbb787607c053e8c10309572d2ef223786fc454d962fbb5e3cde5320117f9efe99041116db48916bc3d2fcd4ffa25
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\stars\wallpaper.json
Filesize537B
MD59660de31cea1128f4e85a0131b7a2729
SHA1a09727acb85585a1573db16fa8e056e97264362f
SHA256d1bef520c71c7222956d25335e3ba2ea367d19e6c821fb96c8112e5871576294
SHA5124cb80766c8e3c77dfb5ca7af515939e745280aa695eca36e1f0a83fb795b2b3ef406472f990a82c727cea42d1b4ef44a0d34a7f4f23e362f2992dbff2527798b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\web\wallpaper.json
Filesize379B
MD5e4bd3916c45272db9b4a67a61c10b7c0
SHA18bafa0f39ace9da47c59b705de0edb5bca56730c
SHA2567fdddc908bd2f95411dcc4781b615d5da3b5ab68e8e5a0e2b3d2d25d713f0e01
SHA5124045e262a0808225c37711b361837070d0aeb5d65a32b5d514cc6f3c86962ba68f7d108bf4d81aa3bf645789d0753029a72c1ce34688a6d7af15f3e854c73f07
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Temp\BrandPackageTemp\24.10.2.705\resources\wallpapers\web\web_preview.png
Filesize8KB
MD53f7b54e2363f49defe33016bbd863cc7
SHA15d62fbfa06a49647a758511dfcca68d74606232c
SHA2560bbf72a3c021393192134893777ecb305717ccef81b232961ca97ae4991d9ba8
SHA512b3b458860701f3bc163b4d437066a58b5d441d8a427a8b03772c9c519c01983e3d3fdb8da20f6a53ad95c88dcdd0298f72822f39bc3672cb6f1d77fcc3f025a9
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\982b94d3-9f80-4872-8135-5c3fc9b1badd.tmp
Filesize212KB
MD584f61776e8b8e7b04151c2a8193be8ed
SHA14c777002bcbcbd6efd8aea22631dc9b24f6e41a1
SHA256496cc7ee86cec664d7c705ac98d44804f498712e75ce81e7a3ce4458b9be861b
SHA512d823f29d76f2dd22b03d03ad0d92c85fb143affd0cfb2770fd3b4f95e6553fe3e6bd10587d61e00c905e7d4756754c988de11ff44bf804767e3ac3b3c76f9ea7
-
Filesize
48B
MD54dec9876f9ed0b5fa2f6ed607782fe8e
SHA1d6b17160ce1f5b2bf948fab35bdb62b7405cace2
SHA256d89315206ccc859c6d0d4b4f7ee62cd3f4806dccf557f63b7b3399c7b3a8f3da
SHA512cfb9279b273578d42585738f4a4b7252faf401cc97663c37afcdeb0b4424c519685a36435ffcb97f7a725f5099e16f0dbd31d47185ef1d25e1cf0b22fceaefbb
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5b8ba4ec8d1e3c749337c95cadcc24d0f
SHA1ad53fabc99a58951c6a97b1890ab9c7d735d4e28
SHA25668d9b3946ad50e17d5a00d3476e862e4b884459e60512651558ddff26edfd2e9
SHA512ece8e4f790d6256f9ac911eba747253324e88b6d7ada515f322e6d793b9222ef1e297f8f4d40e4db987c5a8fc3d81080a06dedc86fe9ec0bfe30944f0a674575
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5be3b654a09f54e1c127d684ad5396167
SHA1b9e99d6ff5fce75bde1b2df7beb03420080024d7
SHA256ad0190dc6fb37d711ee80c74b59c7eae4c944cdc217dfaa9c3f3c91a3c2dd274
SHA5121988f01b1de00cb8751fda5643c44671927da4f16af7282d43242b1366a04f53c3d336affc93f9296a7462a5ee7f2b03b6bb20436900772f0c66c1f912420a72
-
Filesize
256KB
MD570aa9d672510c6af86f334c653f7635c
SHA1aacf7277044316b6562983a5ad01b86655052aa3
SHA2565f78ac57aa2c308957f9ad447f969fb4be5b10b0028d62af1e86584064f97959
SHA512bd466c1286932f7cd29da82646df83ca0d8be736cddfdbe25f25d8ab3963cccab45aeb7cf668d26f0ce6e3b668d2d6c6271bb68f0658300b8fa75638e9039cb4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD535c8b0ec10f2026f36843054dfd343ad
SHA148897f2bf6d73bd9946889e18747e4faaa7ff904
SHA25698cad40a07a44b8ddab06a90b9fa256e619573899dbf1d90955145c155ec2b8c
SHA512edb9a4f6ca15ab4047072ac7fbf9a3f4c1eecc4695c12cd658500e31f7e31086908266562eef08ba50804967671d2a145944a91c31019b35a45848065784eb03
-
Filesize
11KB
MD58a6c6e14779075e5fa0132fd85ae62f4
SHA173ed90aa93ab5b124ad38415c478b42994c73025
SHA256071e033060837a29efcb05bc1d21c575a88c342a0eed2a44ea62f593dd4237a1
SHA512210695881d32f0035af06a7339e580993553e9301abbae23f582219e7fb8bf0ebe025281c09296328b244f82bb2dc2e44d02f0a75190dc5f39facbb0760f8959
-
Filesize
15KB
MD5501b72ed1d19046ddb77c67a12abc1c1
SHA1972db7991bbfa68a312ffd4e21260495f6548a19
SHA2566e625a846ad01a746cd760fa5bda41c382f13255d1ad56640c3445a7da937075
SHA51295caa3f32c61cabdf4df3c531ce09f2000b5f67fb31c2cb7ece1d3b5456e1a4470dc140e85a07603ca88b631cf90c50be0ccd437681bdff59a2d6cf6d4e19b9e
-
Filesize
3KB
MD5d0f36bc9e92c8bc1b1179e0d902ad19d
SHA1772c71b8230a09635a378ffc462ae0508b32b731
SHA2569c0619aac91a1562285afcd988d9a9eca3f85692e80084c162fe8ec67bb47893
SHA512eb733083c6e1a1e124cb53e357182a78fbec4a50c7aea042ecf06c6e3a4bfa650ba66bf727677c682d8ef5e397af2998202fbccf9d3d32d0c986e29b8b60e42b
-
Filesize
11KB
MD53af0c0c1ade774faf83b337d0d1c2781
SHA171b554a461c321153403a23125b93a30b3cbc225
SHA256062af571b1ad0b8025a267a97ccfbe31393a77d28e6e31d8e06100f937f98000
SHA512de6d8599216948b58153b80c95ad994edbbe6efab5515657d1a0f163ea7a25b7dfbf43d5c558d2c8641ddca26089ad25b2331ac19730e5aa0f3ffbdba9a85b47
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Secure Preferences~RFe59f0bf.TMP
Filesize2KB
MD59bf88e58128a35f96e4ac3f383f5ef0c
SHA15e618dafac97625d4e0ec2c99f0459b4d867a47e
SHA256bda84820f53c02c83c79b9c6a8932199fc07996c8d318f60e38140ca8e090761
SHA512f1efab6a87802f1e918dc46e6c4560c03c18544ea88472b4c037f47f2889d79299f543d5318efcb162decaa417e7b2b8752881748949ed34076f795d20e95c0f
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\4be3345f-4b76-4f48-9838-54349ffa90a5\index-dir\the-real-index
Filesize72B
MD5a3005bd7983e17c42aa4fbdee9bd4a24
SHA1b425e90a193fb3183bc5b64a0ade64c808288190
SHA25634e098cc43ed07d0b634f6da6fa0cc01567b1afa41af23d157ae5d645796fdf7
SHA512fddc7b7772acd56037bb2d9875962dc7ef78fbc3cc872904b1ec13c6b5448eb024f16cf1cbf54d033b9a144cbb7fd5cb4c64a0e41ea4cffbb78e2b613678fd35
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\4be3345f-4b76-4f48-9838-54349ffa90a5\index-dir\the-real-index~RFe59f9e7.TMP
Filesize48B
MD57ea46d3ec23ac878dc0becb8640dd1d3
SHA189fb376cf0e0a121269079aa34545b1e6f231eb2
SHA25617ef90d849cbb5fd8292d68398c8578c00ebea6af3237740bad04e870f44b069
SHA5125e9cbbb6b2f2f245b01fa37e6fcaef1ff8246ca363841d5cae5e85d9ac9d9f0caa368f612a82fbfe9879651defb3c30157ef9d6ba3bbc8daad5a0f3ee885ffed
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\9ee4c6ef-c8f6-485b-a79c-e61454322e94\index-dir\the-real-index
Filesize72B
MD5637119cb8b11c02fc786c35d46c00af7
SHA1e1742c0a47435408f7007b44ea9c16363c7218b0
SHA256fa922787e30ce22946bb194fcdfdbc2b39b0376dc01e45191c08d280772551f2
SHA51226ad656f31a7ca8144c5ebf48959f9312f0555489e3416e2daaf1ef547caedd2ca6e0c2f95df5180e6898b411fc4ad4f652b5355a263b565a37a854480376673
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\9ee4c6ef-c8f6-485b-a79c-e61454322e94\index-dir\the-real-index~RFe59f9e7.TMP
Filesize48B
MD58304149c4be98038e1aa361ae147822b
SHA173704c2d6589c412dbb494087a5ec5f35db74a63
SHA2569dfcbee7e9b972ed6d96bb284802896241c45a47ceb634d31e277a94e885a305
SHA5120e75aa0ac310b9e88662cbd58ba1b408f88290fcabb79e6c06e885adb1f529c5c3822131d6483aa4c49e10e2ff35d8d6d27b300ce5d62289e21c83066ed70175
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\a5bf455a-fbc7-41ca-966c-ba1e6f697f98\index-dir\the-real-index
Filesize72B
MD55f21951a6a1f3ede086fd06123fd4f36
SHA1bd2aa3ac5b75020589d6a8b533db0e27a82af588
SHA256b45a1cec31f7729411c4f92321d9146c1f2612b71371a727d590079cd1e8b3fa
SHA512e3e06e3098e14922e222b4e681aa5eb6dbdffb59705c9a453a58a0396d23a6f168eb1cc817ae5828f4a71422a513b103801f089ad139767afccfac8d48abe9bd
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\a5bf455a-fbc7-41ca-966c-ba1e6f697f98\index-dir\the-real-index~RFe59f9e7.TMP
Filesize48B
MD5bd549d120fa11ef49db831c4322f756f
SHA134e4da866a60ef0ef609318a2c5fd673b3c8922f
SHA25645326db70132ce8ff4465557bc20c714e447115717b260e9bb93b6f5a0188641
SHA512592adee4848bc5250fbfbe408797235728f99682d008f9d26a9105592494312402101c8184e3f947d6debc074f763535be9bf7418cd5a5853bcdbdaf08ca6aee
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\index.txt
Filesize273B
MD51f8e3bce7b00cf98a8b97372526e4e6d
SHA1673e757c9f6fefdccd60a0aef45a9f7f002e141a
SHA2561ee674575eb04d1bf6068f7888e1d6ffdacbde373eea0b763bc4f2608038fc70
SHA51254fdb72427bc6398d7136353e5531d19a2d2c0cfaa5426746de4b472a6bd05bf30ac3b28fcb48306340506b555232a7c517c7bb71b6b8fa6fb10ba082f35d058
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\index.txt
Filesize328B
MD5e0c2c57eb2de9dc80588d48a2a9b6c65
SHA168e9bf295d26f8e574fc1e7c457bf2f0ed409672
SHA256df3f632fe7e25db393f4040374890d66bce135b6785fb18bfd78d183ea36af8e
SHA5129eb60f7ef7c99cb2df87df0bd201231f021fb613c75ef591dca643d269c710b0e2e6936f4e9c00671f9f923d2c030a37e1faddc70f05880a84b2b7a8d3a9769b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\index.txt
Filesize323B
MD518db349289309e04109212a11de99831
SHA1114aeea422ae6a56e313e0064583f23ffb2ba75d
SHA25659979a909b7dae017dfcccd28312f771b9974dbdeca36d23269f142e39d4c7c5
SHA512ba49d2968f50ee4d801b1edc363ab7e75847cb5db1a59473595e8899e93fae8180713869b8957bff295bc37fe430f6b25c0a9e75acb403dd21c935f1b16f0e2b
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\CacheStorage\a401a5c3e5a6e316d830c597aeb6f7a2ff00e988\index.txt~RFe59f8be.TMP
Filesize208B
MD5283125c0a67cf5725b3a9245c2a3d81e
SHA1cfd1e44fe5ded1e00bfa76fd3d4313789e061038
SHA2568f3848554ba601dfadc1afca70c9cdc983c43763661519b479bee5330943afe0
SHA512d58d40d2672be4ef8bdc744b9900ca5be534b61ff0746ddda13fef6429e7d5bef448d77058377dcfd31e3161c0b0a16a8b148e2a392c3a68a98e1df88cb3bd1c
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD564f773a984558d2dd2b8a850fc8185a5
SHA1619465cfdfa4d1e05be2fb418e3a24f817b6ec6c
SHA2569597aeb07274b777c9071a332bd8464c6f80bd7fa3522075fa873b80faea3071
SHA512e4b8670c3ab999f2acd4a46558adbbde69febbfd419153978dedaf1986bd88ee57e53a1517a92497e7ed4e0923ce93229ad5a97898d8af58ee6dc50cf4a5c83e
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59f9d7.TMP
Filesize48B
MD501d5a66c72d3f77da31ab5a62b90da5d
SHA15a31184bd99295f388619938e44f3351b7d60887
SHA256fad72e985016bbca7248849b60facf26bb79320ce08e863cbc1eb0d206c2d8e6
SHA512171203bc517c3761b3dd8018c4a08d687607569ab6aa622ba868db2075e315b7c5495289d27c976e7252d294b1c0a1e25b37891412cb13b475e5164bdf96f904
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\TurboAppCache\Nativecache\bd7756c5-7a75-4a2a-af7d-79cabdd1c273\fef132170d47887d_0
Filesize5KB
MD5964a5d65e5004216a030e7f9550797de
SHA1f7c96e3a0fa44c7c0aec658e62abf3c0dcfd8f68
SHA2561b33f17c9c3f0bb0a777de952edc99f5f560f9882eb6ca7ac167cf93de877306
SHA512bb55273249b30ca2e6ccf73d764096713d437886520241721b4f1b2365fbf00a1b60555c4c18670ca0d048326381e04156049ab10ca7fba8ef40e2d641f9aa50
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\TurboAppCache\Nativecache\bd7756c5-7a75-4a2a-af7d-79cabdd1c273\index-dir\the-real-index
Filesize4KB
MD5735921c7e8ce00e6627eb2de365c0763
SHA143603dc948ceae8179577bbe3b9ae6a95d915a47
SHA2564cff87539f81506519fe4f52e0dad19b012c66d614f85040cacff418b52b6cd5
SHA512f3479e9ef92bce32023177d974d28b0480e2bca7bf6edd336fdc0fefb86659a95c7cd492706bac854d3f2360694a92d1053db3a3424ef4115771c56c3fcf8caa
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\TurboAppCache\Nativecache\bd7756c5-7a75-4a2a-af7d-79cabdd1c273\index-dir\the-real-index
Filesize4KB
MD56f4a067d982383ca70cd9b063d2ba602
SHA1d687c4fcde5fc07e6c6030ae5109be1ea2837d1c
SHA256fabac9615c4e5c9a95404a88d7b6bb1f3899e82b19113d2163f850ac704e335e
SHA51211f8cdfc3d08c81b95010cc663e8b3429a7987d075e2f5b7edf779e733585d173e2c9cfe76eaae624d912527693fa41da6919654c0fafdd039aa0ef6327a7333
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\TurboAppCache\Nativecache\bd7756c5-7a75-4a2a-af7d-79cabdd1c273\index-dir\the-real-index~RFe59f9d7.TMP
Filesize4KB
MD50c669f7d120d3d1c3c2cebcca9ac5b11
SHA167c7963965bb30588e8cede44e773e077b61d959
SHA256b257bcf767f86373726b874313fd60279c1b92d2913d60b4aa56767450b2bcae
SHA512af3cf76bd18407fe7af0c1ea224dff4f5cead71a5222a1da899671a37336244c90cfec428476f05ca14cd08cf6ba23ee782cc7ced7fd63d25c5f8760b6098217
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\TurboAppCache\Nativecache\web_ntp_cache\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Applications\Manifest Resources\bcadigmkecmhhknameopgaidphameinh\Icons\128.png
Filesize11KB
MD5363bbbffe31e45e3945aa0ff3b8cdd1d
SHA1f223255a82218ddd45bdf54a0cf1e8b438a67edc
SHA25639b835c3dcf4261025de83d49ab151f5af0bc1ed8845932065aa1a333f026684
SHA5127bbfb3810a2bed3d2a8a899afa95412cca95fa6916b1684ae3182bd0ad28faa7076fdf328281d106a53c10385667729b4089b0050610e87eadef2f3ff54e80be
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Applications\Manifest Resources\bcadigmkecmhhknameopgaidphameinh\Icons\16.png
Filesize699B
MD5238b0e7dc06028db4b6aba8078740ffb
SHA15fd2309587993b371beabb7a9d039e0dba3006ba
SHA256d159e510392f6da58c4d15cc098171d45c7b02a1362cbf7be7a2d47a1a10e7fc
SHA5121dda4de21be647067c04dfc47174df39d0c6c1eeee3e9005211f908351b69d6a27ed268b5ec7480285fb203a95136a3a205f7bafb7eb5223a3dcbab0dadc0e5d
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Applications\Manifest Resources\bcadigmkecmhhknameopgaidphameinh\Icons\256.png
Filesize24KB
MD5a363094ba5e40a4760a9bf566e5defd3
SHA11e74e20f48ec878bd0b76448c722168879c5b387
SHA25605ae2d6161a3acd83798ec56dbc45087e6aeb0a1376401f55aa46539b1d95559
SHA512ce30f312cc08366aa588e75b229c178a83cf6d464a1051bd1118b81e5166085a2b1bcfbff97804f3e8662366b59f43a659e4b0e315dabad125f16ec9ad9ac379
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Applications\Manifest Resources\bcadigmkecmhhknameopgaidphameinh\Icons\32.png
Filesize1KB
MD5d2e7ab79b45eda7c4421f296abf37c52
SHA18490f4e098d50ec161e64db912f8430826daf2bc
SHA256ded3490683fcf3c5b87803bb1835759df2b65831a6257a326709a708a1dd45ac
SHA512094c2150f872e727980f84b6c011f13210d43cbfd9437825b3b014211c69d7bd3f6367e9913370b624ddad270cfe91c190ebf2c5f5fd4e082b5d6c85199cb6b1
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Applications\Manifest Resources\bcadigmkecmhhknameopgaidphameinh\Icons\48.png
Filesize2KB
MD57cf35c8c1a7bd815f6beea2ef9a5a258
SHA1758f98bfed64e09e0cc52192827836f9e1252fd1
SHA25667c320fa485a8094fc91cd3fcd59a7c75d2474e3046a7eb274b01863257fbe01
SHA5120bbebde654c9f44cf56b74fc1a9525b62c88724ec80658efede3cbb370c3a6d4f3e78df459bbd0559a51838f4a172bdfcd370bd5477038309024b77cd69f2a15
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Applications\Manifest Resources\bcadigmkecmhhknameopgaidphameinh\Icons\64.png
Filesize4KB
MD56f5486bcca8c4ce582982a196d89ece5
SHA14648ae13d71b2ff681cabc5d0b5b4bb242cb78a2
SHA256c870819a5c73e2ea5f94312bdf10fc56668d3311ef2eab6509b659efb456bb8d
SHA5129a36d519a9cadf5b464a98082511906cc5f24c4218f6bc2ae323f6b38bf5fd413614807ef0d442801bfbc3b2ce2a0527b0f7be24fd51f49cbde6b5dfe2cafd7c
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Applications\Manifest Resources\bcadigmkecmhhknameopgaidphameinh\Icons\96.png
Filesize7KB
MD5115decbc3eb53574b2582f15a0996e83
SHA1598a1d495135f767be6d03cf50418615b22146b6
SHA25607fbfbda84eb5467b120fb3f9b4e028077303098bac8c2934635b14bbda847e0
SHA512af237ddb585ad38fd0fc3d0f0b75c60d0117e965a548bda055b2625f86ee7d91fedc840e1afa2fe80814f152732371255133faa21c3d774ca9691446541cf46c
-
C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Default\d01d468f-8bb5-41e8-b638-05fcab338d95.tmp
Filesize160KB
MD554497ce2271deb0e673ec048b44da343
SHA15f886314234b7aa6a4da5efc937a9d63ed007727
SHA2563dcf052bb8050fa32f28873bb665f63f457799cb9a92549fb2dbea94014f929b
SHA512d0d77d763b1b12c1b9d7a9a3f2aee4640ed5fb10d828b7c3c2cb051504c2b7b6438309124b934b346a4152c0aca009883d6bda42dc997188b8ca2736ac3419c9
-
Filesize
40KB
MD5e6f936ceee102fd1074d8cdbd25de891
SHA15f85f7a1677e019afd0641872ed980befd455a0b
SHA2568a3ea6d99e1a1aef41081ebd3dafbed429d833a662ab591ae54198cfb55b5f11
SHA5120f8e1522eb8e99ebd2d855f9e51993d7e90f173a214ae7a2f42fc3b14ef046fced91df45230775c51fec9e32e1b1f20b37bef1eeae12c8ccf166dfb43183f9d1
-
Filesize
40KB
MD588b3601d1edd06dd61491eb3820e0862
SHA1d0b20d796e35ee60099280a63b0ef1ae4aeb7072
SHA2567c118f035c1e746c684e6a5c2ad253c594fad172b12545bc51eaa577a3228e8d
SHA5127a98a345dc6e3bfe4417829c0198f909e28e5b1139902790924e68226dc21f7dee8e2fd5e357945203362830263da0f08f28c2af326ae74b1f366eda69a2066c
-
Filesize
24KB
MD510eaee6f9e292cb16fe7582a859de926
SHA1dd17acfce40b028950f684d40b48f7a7554ba504
SHA25600e54c5635299f5057ce5faa371358865c0b0ee79bb2d7979d851ad3c8037157
SHA5124e8fc951d68529d2c143f44a4664327ff5c2d1662f5ce018263f7679841feed742f6bd33437666e543087f488e94021ca253ea4d8dd633c65516ac610bd16a59
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
231KB
MD5693142c8595aea80cb476995e1699b05
SHA1fb3461f05e04a5fe8ff7a86b9fc91bb2183095d3
SHA2561bf7561457ea36ac6c4a0efe5aa9e288b6385889983645660f358f8daf5db506
SHA512fc1b2fb343bd87072cbeef2e42f9eff903305515ea8eec715bc4795fcdd565b7161127d521eb7bf3fc0fc30135ba80cbc155fcfdf71d4e7246e02e46587b9836
-
Filesize
1KB
MD5d19e8a5670665a61a3f1496d9a08486d
SHA1e0613acb41b82f65c91eb8e6cfbcfa3c470c96f5
SHA256e7ac317bfaae4e29f4725acea229efe350e74d847808c158ee3c22e6a8cd1b20
SHA51207791c5d8ff60b58226da3d726967416eb00e0cc3f25fe5ce6371bde2521531c15819a0a0fd8abc3b488758efb193a9f5a09d922bb04275114760805f9ff4887
-
Filesize
14KB
MD52257fa8cef64a74c33655bd5f74ef5e5
SHA1b9f8baf96166f99cb1983563e632e6e69984ad5c
SHA256ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3
SHA5127792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9
-
Filesize
68KB
MD5d4d8fb0fd784bf58fbff4cbec1fd3059
SHA1579acae7275d6c9a3534bbfdc79afbc3a1daeb6d
SHA256400e9369d3ce504d125e9e6f60fd9e6d83caaf4520099b86b745749f0a56dc57
SHA51271681ce331907de4d55304264f0a20bc567da183b71e6a1cefa0acba310856d438f90d3119300313de73cf14e9594f71be4d9318e9002b931fe14753c1644917
-
Filesize
2KB
MD5b67109c9feca5290f710ee54334425a6
SHA188b4cc549a25a57e3a4fa47ed8101938bc682552
SHA25652133ec9a38bdcb5a71d27742a4dd010c6b04b971a64daa8f2f8c4fbb927ef24
SHA512c2f047b1635a1c71cc690967781343b8fff22931b443807cfcb833bbeee1f4dbef2a1767e3c1acfa4dc8802503d79b6b11b989b01372d27d4b8e42db67f30837
-
Filesize
1KB
MD53adec702d4472e3252ca8b58af62247c
SHA135d1d2f90b80dca80ad398f411c93fe8aef07435
SHA2562b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335
SHA5127562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0
-
Filesize
22KB
MD5bfbae67eeec9d18a710c919023e974fa
SHA1e4fa31e998e8c76d3485927feec68081ec750b8c
SHA2563f2692b575c7a80de973bde4e74eab5e69d97f9ad65f4aaeb34525b884a8f94e
SHA512309b235ec6054bda082813fa28b18ab0f2dfb7e67d76735849a8cf5f95e895d9cbb263a749644333a9381ca7fe71ea00ded97bd41f52a80c2cd1f31b9055afed
-
Filesize
314B
MD50704992fae829dbd9da15922814c364c
SHA1db3e1b3d74be8d5e72d49337a0d2d7059309c7ce
SHA2560ff6f5c534724d898adc8b98e0fa10022483e3e5e07bddcb6ec92243fac05d40
SHA512e2d76d3bbb48312c73b83aaa958b319d0d88e54182a492e528135715d344bd7fb63e1009b5a0ac3f184ada23b20777c307daa23477a476e774ea1062312362f5
-
Filesize
72KB
MD505398e895a1d2751ac56f2d39ff194b7
SHA18233e3a8deec50f0b71e56779010039ab0a279ea
SHA2566ab6557dab9389cc5538fddb397176622135aa37c883c82f026c11fa18d14af3
SHA5122144a4359eaf047b18cea41c476d8c61afe171e2df56fc1227177e68a11182b716a5364222c90bda9ee98476fdeb5007dcaa1d5f000beb527e37b6491f2a09c7
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crusis.gen-94cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8.exe
Filesize609KB
MD58a371db4cfeb51386f97345740523a46
SHA122d30984e6b4ae0188f5c267e7a0ac0d531e6256
SHA25694cf304b8f43a832feed0ac7d539035065dd09f51cb2be939f738e872edccdd8
SHA512ffe2f86d14ee37f16fbf7ced00d0578c0dda8c73ab56cff37e8c28bd25dc22f5addec8cceb477eff07b2e302f873a7954c2fa69c8f6ac7e6efb780439727b5f6
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1.exe
Filesize2.8MB
MD53a0951a58edc4aeb6a1dfbe30b97ce4a
SHA195c2076b2cfddf94ea4ab06ef2d7bee03eb6924e
SHA256184d9e02b96a1add7942f60c6e141856627ad66a1b3294a2a18ddf33afd81cb1
SHA512db85e31d020864a38f9488c950a52f486ecec45441d0883e2d9b293741928a4a90eb047ab06663779498b9d3cf1db309db53b48cec7679aef9c8470210ef961a
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Crypren.gen-1cfbf371623499b7d638bc1274d4f58d88688c4f85104a9dedf2d07cf9d2907d.exe
Filesize196KB
MD559a4ccc7a667232b0432a5f751e84657
SHA1848f89577995015a24fd85bb10b5ff77b95e67d6
SHA2561cfbf371623499b7d638bc1274d4f58d88688c4f85104a9dedf2d07cf9d2907d
SHA512b0f320075b01fc4321c5093a392f315f9a5a084934d64b431132d12b78a53b910c4ceaa03e8418aa63219eb0bc4683385454226d46b5dc839911384d79a0edea
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.MSIL.Encoder.gen-71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Filesize2.7MB
MD583cb5b87a786fb135a11bc133fb4d4d6
SHA1f0fced87788092368e1360dfaf830e6ea1f1ef1f
SHA25671a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb
SHA512dac2ae2129d2dd477cbd84e2464055cb298407a06fd7fd24c54cb38f692914e9f9cdb8320e23861f25642316b05de411d840021bb7b0a15ab21a035f0d68fe12
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Crypmod.gen-8e5455de04f5969f678972b5a8cd7e4990c4dd09a10efdd3690a6ca78bd57e30.exe
Filesize1.5MB
MD5f8aba298811993b88a5fc082f22877f5
SHA15a447673f9f1094463a45da1234f71381d5e5dd3
SHA2568e5455de04f5969f678972b5a8cd7e4990c4dd09a10efdd3690a6ca78bd57e30
SHA512f10b131a7356921727fa8d08f9441be41688dc32cbeabc1078a891e07be83db4d90e6f7ce57c3fcbe6c9a2349a93cc45ab875076869dbcca8a067bd3cdc08bfe
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Encoder.gen-520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1.exe
Filesize201KB
MD5b0d2b573d6097748f9639724d5537139
SHA17e6f59208577467def1ff2262d07025f102d22bf
SHA256520a5f448f7a30ca2675407fa1dfcfd391b7cd3bd7ae54d53450f4653710f2e1
SHA512f5aea7bd653cdc97da797f315cc5d4cb99403d4bdb4be6c5fb2d315b1a8799855f17e399edd067ce4fe0f5a8c57c709cf734ab7e6fe7f0bd4cf4a737ffe6d12c
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-6cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8.exe
Filesize159KB
MD50b0f13ee90f164862c79195be5aea92b
SHA1670232571a1ef2521e649819262bc5ac531f5ea6
SHA2566cab3dca7b74e6f38f224ba1f35b1bcff8ef4f54c14a3b10eb2fb67b86bc43b8
SHA512ac0e4fc0e7a6285d729601b7e06acdd306b4180cec30f1c5547d50f2b94e8c8b5ff02edf23faf0242dc98f11fb3d503b70a465a387af7e92032ace2f4e080a81
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Generic-e8de0f06e4545ef56d98bf2377ff2cf4d85be2b212de88c2aeae53e89c99df2f.exe
Filesize802KB
MD530728af8e3b92d837f0525fabf63c6d0
SHA1f33a3a3cfaffd134957468a22047f7fcd8207f5c
SHA256e8de0f06e4545ef56d98bf2377ff2cf4d85be2b212de88c2aeae53e89c99df2f
SHA5127264a0596e74bead9736a9f581be6b986ab5980db3d928b113b5b795652e70b50bff1e9ae2a1db8437e752266503756637dc098595192d53efcde23e403241de
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-8633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893.exe
Filesize892KB
MD51161641f743725cc58cb071d861bf58b
SHA1aaa1f11d1961793e99342c4d9be84a062f815624
SHA2568633dc633c9d802821b816b45d6934c1c502453ec92c8ccfa0b206aa20ce8893
SHA5126d6b843c3e27ee74e1af1acd4edb79f5c002d1cab9c15851b0d21772260fb0acc1ee9b37c0d047c0aa3f3bf7bd00c7e48b62b1f254aa7023156ce76713ea5bd2
-
C:\Users\Admin\Desktop\00365\HEUR-Trojan-Ransom.Win32.Shade.gen-38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe
Filesize1.1MB
MD538d1e069b9e9b3e0c255e49115295b7e
SHA1151b38a5fc8271cfdd03c72367b55242f7891f78
SHA25638f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05
SHA512a8334a202415641ca9706de45df45dc9304643b141ba4651bbe80c1c524b72ad56ab4cda01f45f08c3727991ed7789f9bf238d9304a5b8d8a41140fbd7c53610
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.NSIS.Xamyh.aef-cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529.exe
Filesize433KB
MD594c27555a7febaf5e958960015b62b7d
SHA17c13431eaf229017489e40d872629e34473c6ca7
SHA256cf34f06b7138c8de1d716e3d8b49934debdcf7b8bc7b1377103bd2a9321b1529
SHA512406a9c21cccc3bd3536f7cf796b11498b6e378d936ebfb39c35c1270f5f6da1165d5e6f51bd96ea860649d72d7d406e6c9015ea90b43dbfa725c9c38aba8d677
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.cfwh-b6d9e74bb63bfe8a7087e235121d22f8f49734020db762293b2ae9d036aee09b.exe
Filesize338KB
MD54fafe823e79f40d3e5094c1208b52826
SHA1fe0417445065a833e68c3e401779516464471c8b
SHA256b6d9e74bb63bfe8a7087e235121d22f8f49734020db762293b2ae9d036aee09b
SHA512457b47ff7ab957a5cb11de157cbaf5676368fbb0be398ba25e27949129a007bc32dd263103de89f913ac7b42bf6c5c66c7c180e12d00faf845364b729453735e
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.dmcu-8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b.exe
Filesize255KB
MD50246bb54723bd4a49444aa4ca254845a
SHA1151382e82fbcfdf188b347911bd6a34293c14878
SHA2568cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b
SHA5128b920699602ad00015ececf7f58a181e311a6726aece237de86fcc455d0e6fcb587fe46f6ef2e86a34fe1c52d835c5e2a547874a7906315247f07daa30e4323a
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.jyqs-18a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c.exe
Filesize177KB
MD5eebeae0a4c575a9c1d2d321a253bfb46
SHA1b6fd43914f7fcdf9ebf6e359a74cf679c7eb00d9
SHA25618a1a3cd0714abe8b5b16e84bcc615383613774466f6efc045cca28f676a488c
SHA51202be135cbcf7d0cbfdf207ce8349eaf69b8f41c5e45e6ee38351a717532015371410f528fa29e3c0c0994922c7213d14b7990376e7864521cb16ba7c6ce40797
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.kzbt-944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2.exe
Filesize191KB
MD5389badfc761e65f0997fe051104626f6
SHA167190e2eb58a6ade44380f83486fb2b3fd9da863
SHA256944a9bd6a317595a5348744eff24e6169bf60ad3f1d5a9b6a2697b2aaa6f51a2
SHA5122981fc8af23722026531ddbd139a64f34024fe8d219b8068f2cff40857b0741b1e42cea57da6818487491bd29ee526a4b9283b288dfb8fb1b9e2c7d53692aaa5
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.lcui-b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd.exe
Filesize708KB
MD52532cf6e42031ebc3d2241a58703a14e
SHA1b35642205a64448b34966388442bbf8c309e629b
SHA256b115ced902164ffc754fd05850850ac5c3f55c687a20e14dd5d8213d267ec6dd
SHA512861299dd23c61e14a8b09aa4a1f389e00bd5dd9358cb96f00a0db440828ad6cd816c508a124d633deea88bef0d2b0debf7e7c8a49b22e5a24af1ddc9118f69c9
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.llbf-5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd.exe
Filesize277KB
MD57abb61412a064ced52fb6174352501d8
SHA151b2967bcbfb38ab1059eadf275b64fe9e0eedeb
SHA2565e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd
SHA5121ec6410bd09c081b6df36d27f101fcb60b870014fff09e2b3dd62107b5e2fa4f5cdb6213f5413d72abbdcc511f9b952229b39c5c5d9cc43b9625c485ecdee018
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Blocker.lmhm-4e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238.exe
Filesize280KB
MD5ba23bb0a0349dcd0d1e9073a8728423d
SHA102c8c412461fd6deb3d396be39f92911cc0fa077
SHA2564e377257c481a9011bbd0f8e7de0dcc8912839b820f6454cf3801e6924c16238
SHA5126bda5c10ec0fd2255e636c5d36f208f1533052945b8c580fbb8282015823ae29b1cc5ec43ac743b2295e54558f22cafeee726fd1e7e00351ee002c7e78b14b56
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Crusis.to-498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab.exe
Filesize92KB
MD5b57980b72eb6497212f86353447d2e5f
SHA127b49e51dfde8186287bc936e1197423951fa9a6
SHA256498df06b0a8d8715e818a582c919bcb5964e5f0eef64bd21f32e52b4ec4861ab
SHA512c9e19dc2a5845176954599e0c0b9b9c06c941f79d65f86ead0120f0eb6a3fe2976502127f31f5c35fc57304939665f57f24c248eb7418b64694587930fabf4cc
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Everbe.ad-f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f.exe
Filesize355KB
MD57a4d1c3f034cc8af39271123286403dd
SHA15b75a2e6d35267b219eab8cb054503da131016ee
SHA256f9108f2e97ab703877ba350d5314a4aa2cd43b0accd568f8f649542cbdde431f
SHA51271075117b6de035ee8ed7b08b896b6744ad5d90e6733c662edfdb857a81145fb1bb64474b808748037c4c883a5116a16c56495a09e92c3269bf583aad5e2b60c
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.GandCrypt.huh-b40e5be24ebb96bfd11d12a972050b3af915fc86a5bd3f6a8545b82882491dfb.exe
Filesize720KB
MD50c1e9370ac6e90d1e2c6f60a399cc74c
SHA158f3a19eaf51b2c6aa3371182bb94ca1f8ae87b5
SHA256b40e5be24ebb96bfd11d12a972050b3af915fc86a5bd3f6a8545b82882491dfb
SHA5122501c0a6faa00a559845612757bbc1346df1fd7504128f4ada55f04df49702a0a5e0daf7b8be96178e11ccb82c9521df3946d3b7d359c2c6b9a9cf8cc5eac2df
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.GandCrypt.jci-ff24c1db05ba3349e08beb535a09bd15a705c9902e9d5adb6f005e624c9629e0.exe
Filesize79KB
MD588e1ac1bd3b8872b31456dbaa5a39de6
SHA105cd14b53b7a5e14ea797a84354d9d1a8dee1df3
SHA25610015a0333dac8a2558bc7c7a12e708e88a7e451ec5a09f89231e6f988b5dc4e
SHA51294f4ae3df062ad19e39e1f1da9c23d13f1ccac9d65b796b10a04dd4e6eeb48fe7576438cbf66357a4623250f8ad1f27aa3ca9c517464e02ea70f0a681a71c5f8
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.GandCrypt.jfg-8b0122198f51599af74f7e40783bf8f8273e8c5bd1a0e0747161bb3fb74bff75.exe
Filesize171KB
MD574501923948f85d7b9a6f192d4be4a78
SHA125f1cc2fff353ef27a472d1c75430c45b7861f0c
SHA256ba63699fbaf51b26d0bcdf6c2388ca273d63fc0093818518d2397dcd03f12413
SHA51258b42b80fb2ac39214b696978aef3051e0ec620140c82f07fd44d3e9143a6e9c845de9fb159ca88089aec08d8d0f9a0ea8c1d0c73be32bf9acf42dee88b58f3b
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Gen.klp-e75e6de7b10900b328ff8f80504a191874ee8c45ca6df94c7ceb59e62cbb15ca.exe
Filesize878KB
MD5856dfb087b2b4285a36f2ff61b154084
SHA1698369e1bc94e42b2b1f01c582a6e77eb074de53
SHA256abfaca19b4978734f0ec9ce0de54d3043bbd37bc76a8af831499e50bf5d2fa7f
SHA512a4fa284bfbc9d43d320057793cf89485a486a3db216da89487cfe4d8f6001ad58ca6d53c9d2326effd765804b8de3cb84cc6f39655b0b336570b76bc7b43e85b
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Gen.lgu-63feec522666cd97ec0a253cc17cf629a7bdb096c04f0b2de4c1bf959d67a77d.exe
Filesize273KB
MD590825d46d41943ad32c67642a60acdab
SHA1dc19cda39b88fe062a620418fe69cda5dee80760
SHA256f15f7866291f9e802caa116943a6e80e51e827e553c33d3411aba3a51714d810
SHA5120a5a278180430b23482c5af24cff3362201b88c3880b820be389b5d3b6e1a4196489eb122aa78b1930c6398e24d99d81a5ab28bd5bd44e097080408609980256
-
C:\Users\Admin\Desktop\00365\Trojan-Ransom.Win32.Gen.lmb-46e25fd9b16ed17f12d92d6e4ece389b5c69706ff8088c14898b354ce64612e5.exe
Filesize270KB
MD57602df8fdc2aba58be9a2dff7aebdd68
SHA16d7e0e780b876102230cf7df45d0aec69b5d5381
SHA2564ae6fdb517f6446fa417f56ec59f84045c8eb79f9a197e21cc33bffb4fec7875
SHA5124f23f6a9df83beea2759f2a6e502d73bd4ed65fdf307cc617bbecad60b8d54192d42b0902933e161b6641d0724e600e65cd3d04d73ed307c1e83802c603e8253
-
Filesize
1KB
MD56a3dc8a5fe8a54fd9a302d7f01eaf5e2
SHA1f3a988c3ff85e27fbbf3d33951d9fa5c0537bba5
SHA256e1e43409ed5a5806f476e943a2912580edeb1e631779402b09f14e7cb429d768
SHA512250ea1f349655ef1a5473ffd37bd7a819ffb8a22dac5367152697a5ac03db93e27998b6ddc3af6415810325adfea9f8db0b5307fe8e413538bf1eecb71792ad5
-
Filesize
8KB
MD5f555c029ede12355e7aad7b03c403d3a
SHA1d009b76bfb6ca28b52865772ee0f54e150980a4e
SHA2560954abc308811ed3c04ff04f719d6f95d40d6de2c7d519edbc237f5ef33bcb77
SHA512055a1fc61028dd0633fe7ee3d8c906fab0df235ded9058653eff43e6218ffeefed9e22baa9d39e00eb284e95a197201c474109733e9cbd907d268a25b6040224
-
Filesize
181KB
MD50c80a997d37d930e7317d6dac8bb7ae1
SHA1018f13dfa43e103801a69a20b1fab0d609ace8a5
SHA256a5dd2f97c6787c335b7807ff9b6966877e9dd811f9e26326837a7d2bd224de86
SHA512fe1caef6d727344c60df52380a6e4ab90ae1a8eb5f96d6054eced1b7734357ce080d944fa518cf1366e14c4c0bd9a41db679738a860800430034a75bb90e51a5
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47