Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00357.7z
Resource
win7-20240903-en
General
-
Target
RNSM00357.7z
-
Size
3.6MB
-
MD5
0b758102387a8bf100d557d773127713
-
SHA1
4fb7f2c833bda0c35b9f71f8ca21bdc1443672cc
-
SHA256
c53872af15e80f9df934aa3d019244f70702dc4f9b8f5432da3013fabe794a6d
-
SHA512
a0f897998c39373fc4bec5b5541690be7a4c748300c4b00aaac5d4255d8530fda71fa8f870fec959c26d99ac1d929a2849ac3da630fd66b16821de174f2b385f
-
SSDEEP
98304:kCRSIuxMklc/dpFMzn8zUj55FZWfX/tYeTsFITZdF:XNL7/dsznaUVrk/m1QF
Malware Config
Extracted
C:\MSOCache\All Users\_HELP_INSTRUCTION.TXT
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (316) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe -
Executes dropped EXE 12 IoCs
pid Process 2908 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe 3000 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe 1944 HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 380 Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 1976 Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe 2512 Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe 1324 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 2964 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 1196 app.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 984 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\etrow = "C:\\Users\\Admin\\Desktop\\00357\\HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe" HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\BC1C9B74EA = "\"C:\\ProgramData\\BC1C9B74EA.exe\"" Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe = "C:\\Windows\\System32\\Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe" Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\00FF1C9B74EA = "\"C:\\Users\\Admin\\Desktop\\00357\\Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe\"" Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iexplorer = "C:\\Users\\Admin\\Desktop\\00357\\Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe" Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*BC1C9B74EA = "\"C:\\ProgramData\\BC1C9B74EA.exe\"" Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\ProgramData\\app.exe -boot" app.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\C1JHBK4W\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DFSC7KT7\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ORIYJR4N\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PG1T8SOQ\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini iexplore.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\I618Z2Y3\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CW1M20CU\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 18 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Windows\System32\Info.hta Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1996 set thread context of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1080 set thread context of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1196 set thread context of 2172 1196 app.exe 111 -
resource yara_rule behavioral1/memory/380-45-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/380-72-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/380-70-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/380-68-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/380-75-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/380-74-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1976-79-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1976-78-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1976-77-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2512-102-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2512-103-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2512-132-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/1976-1798-0x0000000000400000-0x0000000000608000-memory.dmp upx behavioral1/memory/2512-1908-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0240719.WMF Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21320_.GIF Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\WindowsFormsIntegration.resources.dll Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\VSTARemotingServer.dll.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSGR3ES.LEX.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\main.js Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Port-au-Prince Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_Country.gif.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_mid_disable.gif Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_ON.GIF.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\PINELUMB.HTM.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\gadget.xml Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-swing-plaf.jar Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpostproc_plugin.dll.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Baghdad.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_hyperlink.gif.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_wer.dll Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\epl-v10.html Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\COPYRIGHT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Indianapolis Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107024.WMF Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\MANIFEST.MF.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.JPG.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00426_.WMF Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\access-bridge-64.jar Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\21.png Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\RMNSQUE.ELM.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAIL.DPV.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser.zh_CN_5.5.0.165303.jar Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\San_Luis.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libsdp_plugin.dll.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert.css.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\DumontDUrville Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107712.WMF Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\org-openide-modules_ja.jar Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02748U.BMP.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single.png Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_es.dub.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_smem_plugin.dll.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.xml Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.htm Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00058_.WMF.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Technic.xml.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Hovd.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_OliveGreen.gif.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libspeex_plugin.dll.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\THMBNAIL.PNG.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunec.dll Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\Minesweeper.exe.mui Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\RELAY.CER.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\settings.html Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\BRANDING.DLL.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\date-span-16.png.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jayapura Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp_5.5.0.165303.jar.id-FBEE38E3.[[email protected]].AUDIT Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216570.WMF Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02950_.WMF Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\system\wincal.exe Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe File opened for modification C:\Windows\_HELP_INSTRUCTION.TXT Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe File created C:\WINDOWS\system\wincal.exe Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2120 sc.exe 2768 sc.exe 2696 sc.exe 1364 sc.exe 2748 sc.exe 2612 sc.exe 1680 sc.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\ProgramData\BC1C9B74EA.exe:Zone.Identifier Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language app.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2740 vssadmin.exe 1668 vssadmin.exe 3452 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437176342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000088b330effbe6954b8e095853e116b633000000000200000000001066000000010000200000000d90cf97a4a01ba217e18815ab0e7c7744acee2a3a755393f5cfe31c8a766541000000000e8000000002000020000000c21c7fe392014a7614e3f74d79b9712ad37a9ba3ba5369f11337a7755d1de4b9200000004117d8b887a8fde8b71594b716a371413e919926ac6de219f9d816a19469da9a40000000a03ce4e3a94cc499de807eeee97c35ad11f4b04040be9442307f4cd6d2b3b919521f39c22dc381b89062baa8b08dbadca8d3f5eabfca333f67934b21cc0c7690 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700b35135b31db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{371F5181-9D4E-11EF-B686-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff9dfeffff9c0000002303000001030000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 764 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\BC1C9B74EA.exe:Zone.Identifier Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2848 NOTEPAD.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 9 IoCs
pid Process 2908 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe 3000 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe 1944 HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 380 Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe 2512 Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe 1976 Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 2544 taskmgr.exe 2544 taskmgr.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 380 Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe 380 Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 1976 Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe 1976 Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe 2544 taskmgr.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 2512 Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe 2512 Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 2544 taskmgr.exe 2544 taskmgr.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 2544 taskmgr.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 taskmgr.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 880 7zFM.exe Token: 35 880 7zFM.exe Token: SeSecurityPrivilege 880 7zFM.exe Token: SeDebugPrivilege 2544 taskmgr.exe Token: SeDebugPrivilege 2908 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe Token: 33 2908 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe Token: SeIncBasePriorityPrivilege 2908 HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe Token: SeDebugPrivilege 3000 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe Token: 33 3000 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe Token: SeIncBasePriorityPrivilege 3000 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe Token: SeBackupPrivilege 2712 vssvc.exe Token: SeRestorePrivilege 2712 vssvc.exe Token: SeAuditPrivilege 2712 vssvc.exe Token: SeDebugPrivilege 1944 HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe Token: SeDebugPrivilege 1196 app.exe Token: 33 1196 app.exe Token: SeIncBasePriorityPrivilege 1196 app.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 880 7zFM.exe 880 7zFM.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2468 iexplore.exe 2544 taskmgr.exe 2544 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 1324 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 2468 iexplore.exe 2468 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 1944 HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe 1944 HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 380 Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe 1976 Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe 2512 Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2908 1688 cmd.exe 35 PID 1688 wrote to memory of 2908 1688 cmd.exe 35 PID 1688 wrote to memory of 2908 1688 cmd.exe 35 PID 1688 wrote to memory of 2908 1688 cmd.exe 35 PID 1688 wrote to memory of 3000 1688 cmd.exe 36 PID 1688 wrote to memory of 3000 1688 cmd.exe 36 PID 1688 wrote to memory of 3000 1688 cmd.exe 36 PID 1688 wrote to memory of 3000 1688 cmd.exe 36 PID 1688 wrote to memory of 1944 1688 cmd.exe 37 PID 1688 wrote to memory of 1944 1688 cmd.exe 37 PID 1688 wrote to memory of 1944 1688 cmd.exe 37 PID 1688 wrote to memory of 1944 1688 cmd.exe 37 PID 1688 wrote to memory of 1996 1688 cmd.exe 38 PID 1688 wrote to memory of 1996 1688 cmd.exe 38 PID 1688 wrote to memory of 1996 1688 cmd.exe 38 PID 1688 wrote to memory of 1996 1688 cmd.exe 38 PID 1688 wrote to memory of 2376 1688 cmd.exe 39 PID 1688 wrote to memory of 2376 1688 cmd.exe 39 PID 1688 wrote to memory of 2376 1688 cmd.exe 39 PID 1688 wrote to memory of 2376 1688 cmd.exe 39 PID 1688 wrote to memory of 1080 1688 cmd.exe 40 PID 1688 wrote to memory of 1080 1688 cmd.exe 40 PID 1688 wrote to memory of 1080 1688 cmd.exe 40 PID 1688 wrote to memory of 1080 1688 cmd.exe 40 PID 1688 wrote to memory of 380 1688 cmd.exe 41 PID 1688 wrote to memory of 380 1688 cmd.exe 41 PID 1688 wrote to memory of 380 1688 cmd.exe 41 PID 1688 wrote to memory of 380 1688 cmd.exe 41 PID 1688 wrote to memory of 2512 1688 cmd.exe 42 PID 1688 wrote to memory of 2512 1688 cmd.exe 42 PID 1688 wrote to memory of 2512 1688 cmd.exe 42 PID 1688 wrote to memory of 2512 1688 cmd.exe 42 PID 1688 wrote to memory of 1976 1688 cmd.exe 43 PID 1688 wrote to memory of 1976 1688 cmd.exe 43 PID 1688 wrote to memory of 1976 1688 cmd.exe 43 PID 1688 wrote to memory of 1976 1688 cmd.exe 43 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 1996 wrote to memory of 1324 1996 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 44 PID 2376 wrote to memory of 1076 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 45 PID 2376 wrote to memory of 1076 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 45 PID 2376 wrote to memory of 1076 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 45 PID 2376 wrote to memory of 1076 2376 Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe 45 PID 1324 wrote to memory of 1036 1324 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 46 PID 1324 wrote to memory of 1036 1324 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 46 PID 1324 wrote to memory of 1036 1324 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 46 PID 1324 wrote to memory of 1036 1324 Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe 46 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1076 wrote to memory of 2400 1076 cmd.exe 49 PID 1076 wrote to memory of 2400 1076 cmd.exe 49 PID 1076 wrote to memory of 2400 1076 cmd.exe 49 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 PID 1080 wrote to memory of 2964 1080 Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe 48 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00357.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:880
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2544
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\Desktop\00357\HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exeHEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe" "C:\ProgramData\app.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\ProgramData\app.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:984 -
C:\ProgramData\app.exe"C:\ProgramData\app.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
-
-
C:\Users\Admin\Desktop\00357\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Users\Admin\Desktop\00357\HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exeHEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exeTrojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe"C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\Explorer.exeExplorer http://www.gusanito.com/4⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:764
-
-
-
-
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exeTrojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\mode.commode con cp select=12514⤵PID:2400
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2740
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:5036
-
C:\Windows\system32\mode.commode con cp select=12514⤵PID:3944
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3452
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"3⤵
- Modifies Internet Explorer settings
PID:3208
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"3⤵
- Modifies Internet Explorer settings
PID:3828
-
-
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exeTrojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exeTrojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop VVS4⤵
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\sc.exesc stop VVS5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\sc.exesc stop wscsvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\sc.exesc stop wuauserv5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop BITS4⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\sc.exesc stop BITS5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1364
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop ERSvc4⤵
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\sc.exesc stop ERSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop WerSvc4⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\sc.exesc stop WerSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet5⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled No4⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exeTrojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:380
-
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exeTrojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2512
-
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exeTrojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1976
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2912
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gusanito.com/2⤵
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1496536940-9613155-113848441765177296836672998-1759042423-1769170024-1029550661"1⤵PID:2120
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\FILES ENCRYPTED.txt1⤵PID:3492
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\00357\_HELP_INSTRUCTION.TXT1⤵
- Opens file in notepad (likely ransom note)
PID:2848
Network
MITRE ATT&CK Enterprise v15
Execution
System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54a472854159f67a77da41a5fad43cfbe
SHA165ad8fd66f58ad588790bdd5dd37dac2fac67678
SHA256619c4cc1481b27c268fe17892f2eaeaab3c6a1edd05aa8df6ecfb4f6bc74de30
SHA5127533f29d3314b0b1b3af0866ae640a3aa4c79ef11b1ee62bca5117478f5d0e349f5bace57fdb927a072d293e5b09ba988728ab26b995e8ba6bdf4e7c4694f2ec
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-FBEE38E3.[[email protected]].AUDIT
Filesize23.5MB
MD54dd911bc2e31838d0f344b1f50f98a27
SHA103f23e86ab2d83caf1dda833f1b6a94caa9beb4d
SHA256e9d815adeb3ec6cb3d26bccc43a2423f3d487d07fd457d6acb2006ad3f2c3e7f
SHA512606bbe1286c984037176610c913f0fe45788678edc06077a9af85bd2a9167b255af5c3e0c26a848e362ae6d13fec1e40887a31c2c4624a5774cb877dae3e4bd4
-
Filesize
13KB
MD575a27de220d82c6c367040fc9f2b7e95
SHA161eebe3e71253525b489f495405e7791b1eeee0b
SHA2561607746310318c8d92a060f16d1251dc8c5b9e3111adbb98e31a19fa7dcfefc8
SHA5125d958f8ca7f43ebe48e20b9b5bca1f0430de60a59cb2a6ac5c46c20b6678218b62354b2c8ac206ae73b4047ccb35faf8216a146e8d5792a4fa6d072436f52fd0
-
Filesize
192KB
MD5cab07ed2bbf7efaf72ff168015a4f228
SHA18b4d4fb8747ad62401030317db84fa3f90aada61
SHA25651ccf494793243f3eb487b2ce408d9006b591f96a91812e19ae5a67472e11548
SHA51296be5830d391aa9eeb62442605fbd9a1f498aecadbb53b9c9d56aceede0272d13b639897a72c743e109803fa89f6e94ac5c649f30c41bf9c447401a5b8cafd25
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize1KB
MD5ee536ac620dd4c72cadc3bb362526df5
SHA1e11e70e033243e3a181204d60cb2c0366da2ab40
SHA25693aae0e2a061c2a9a685aa62077063be31e9a4f566749b4cff16eb247b9760b7
SHA512f543ca02d0150e0641a5af56fab48c5af00f10d51031def987cd91767f0d3e5af097ce3838d74822416ebe08a02db07c1b2f4b067972826fc14bdc552048ae00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D9127F9BB4C9955D58AD28496EF9AD71
Filesize471B
MD5fcca9c5612ad66a14ec4ffd0a7b4dde6
SHA1da4cf539c43a4787ee0139ae86cd223c7aecd0c4
SHA2566d40a04e4249e6650568a2461c9c893434255ba84f2e8b5ac3aad25c0320ffb9
SHA512237e3c537a5d7631a4e8ef5de2cfdd3c009927221ea1a7e9e5d7d35b45b0018065da1cfdaaa94651b1b2ec41a5158822091f1977fd96267a0c5896fceb5baac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize978B
MD5d0e609d7edec843d1ba67e83ad3f336a
SHA18775520b0a24ffd7215604d97eeb441f1f487889
SHA256b36b0dee37be7bc91f7e5f89705e40665b7a1ad2cfc939a2bbd4a57254689207
SHA512e96da4ef214fdaba47d9307cfdc8067e1504ba8e796c603c6d37ffbd4d2ecf82f0109708a30fa53e84fa44e82d21059710d2564543531b871bc08cb99964aa80
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD503641668e90fc0f182d6585de764fbce
SHA1b9426009ecd93ffb098f1e41c0a6bcf14e5b32a0
SHA256e1fe29d2bb9a193dd4db771d985720dae5dfbb77281bbb848d62e2125b7eccb3
SHA51289610e11d27bc1c48e50b691dbd1857c9e926a65742022039433568b571b8f99136cf9689d99f88b1e4b6b4e5026391f1f5005076226718014282a20f246a38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4db540cc8297552e460e10ca9d89cb2
SHA1d1445d3593ec6c6a33182310e0661340278de926
SHA256a71f707b2c94c0a4e855e55e871c53497d9d257fc86b353d180c3b6896b7f67f
SHA512ac3427e90429eaedeef5be5d4305d2fc829acf57a2bfa8bf83b74cce112c850bda6668792d94ca87946f2d9b4640810d5687a125a4799944cbc6b53a9747514c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378596c158d992c6aa956f8bb43497d1
SHA1770b51ee5ea0d995e0a8e6ad7e61d1f5b8320cfc
SHA2567a4a8ac3c3db01da3a22c42af25b28e453bd6d02853b3195ec40e5949babecea
SHA512499cf63fe56c604dffeeaf5e1090f7188afe75d7bfae93434ef927274b389e72851d7f3d8066b1b458824205e97bd3391d2579b563a9631bef2a2f4bdfd65d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5882437d22d08186d369345528ca5299d
SHA15841485db36a1bd194f6cde62f7933de8f6c1edc
SHA2561a4740dae5bfe5934d85db421fbb59fa6afbecc337e3306a1269ab0229c4d453
SHA5126e6573ee5a2679fb1fa6c8ab08d622773c92c1f949f3e28f22fe9db058440bd7564c9055fe9b0aaf05f764b47bc114341f14c57f5760b34ad68ecbb9de2a19d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa0f1dda06c77326e232e88b649196c
SHA1cf897290c0d40a60af5edfb6bff3bf79b9036fb2
SHA256ee07f6abcea879b997167bbd4215e7030e93a349c875a8df9f0e53c1eff47b23
SHA512e5794522308645312db351960d95dd255fc296996e26cf2fb656ae469abc5770516a49a38bf55792ffb8159d87773ad6f4cb2cc167974d16c0b9d7bd7852a4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb83787bc208d1e6dbbce049f1c0d862
SHA19cdd127196e5addd99715ed1a1391a8966df1a8c
SHA256379e2ec69e3c3ed621dee24dc300f1861b6f31bc27326b5cf859b4863f88947c
SHA512e91e335ccea8afec3d72b1f1ed0d63074d9b91bed05a8f992a2bf2da803f33cb2d4979b949fb494b470e4c030c0115437896d574a92bfb299ce47263fd0d5533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476560c085f9ed9bdc34dae63fbb3f5c
SHA1ec15644adce187f0ff092547317a6d317e58a369
SHA25633f4f999da436a1dea1e541e8f3ec8150979f8dba5bc68bbce830bc4b5ac666d
SHA51276bc6d2b035249c29a0b2e12bd35b485d457cee18fa10477e0d3fd3c3079b8b76924e79096fe22b075263fc1d8f72bf5d5aea081d2e5b79d1572e62e1bf0847f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c474a0586ba14030ba5d0413e0f726fa
SHA15ba754dc7ea4d72ea49f3f94b430198941eea3a0
SHA2568ae9a264cb8c5d601d8533039c386bbe33fadb134df2afcdf8e3cbc3ce2d976d
SHA5129007de25c103cbcf284557b060b41d57542e57a21e8d54b1d48a6feafcd5293107ff6291acbba6d3e285321f5487df17e8fb5acd0e0ecf80694fdb2f9805add4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71505c8c61505ad061008eafa0407d4
SHA19ecf14448c6180ef5757fe7877c3427ab4863b7b
SHA25617476a4508fe73e8f12fd816596ae9cebee64e774cae42df53000e49850d417c
SHA5126be9d07cbb860c3baddfbb3d4465f3f9594b6c9819d3dbbc308bd1cbfed4d7fe74c39cc025424f89573f4ceb9f6077a592f1817da282c9658fc812ad30a7c533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d7590d213f78947526480d36bbe445
SHA152b56217d73df31b8bf0751d62bffb5309ef9e49
SHA2564085f7848cf7329b0d0f4dbfd906193d5716d9104def0a1e12bc2821dd3d12d5
SHA512503006738cb8a4930a3b401c2f8693fcd38f8ff324820113bdd62955be20e09b192fb31598b3841002ab09dffcce05158dae636450dcc9eaae7047f274dc0ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526400b5205e056c8003d6cfc381b458
SHA13800fc644f2c470f00b785e82b08ee0ee9de23b2
SHA2566bbe96eb246a8c307e953eb93850fc3207490fc006f1ca47b9a14590f9a15551
SHA51279e919cc0c17e08323396b8c0f4f536731bd0bdd3e3f15cd7338f4936d302d1562e46a674ef79ec68beafc6ea34084d58b6353de371b3bb4664cfacc92dcb1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97e1d15dd2a7c93cbaf89a3003bd97a
SHA1130980c8e769455323ff08dcf68943c2dfd89738
SHA2561e184819f095673239f805951a5ddf56353af7214a895dca669a3258a47d29ca
SHA51230ad977c011634a17d4e294f725a9c20cbed61cb7391be83b1e434392ef2899371954d76b959cc2c27fddb8bbdc9b55a0b593c0636c8ffc714d72b9c6e7fe800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231805813dff4c4a99fb661c71911ed2
SHA1f00f4890750d037a43a6fdc6352c117d26ded346
SHA256b4d565ad12c6127fc9613d19f57296ef2a09092857adb4c6f61035c222f78ea8
SHA512ddf81c8e2ad59aad333b0da81566163dfb6dd57bebd353dd3d6d967fd145956ba9afe60f92b9258e027bd74f0b8cd5f761d34145daeec142bf65de380395f789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2a0b9cdee84e8172a283764a776327
SHA14007960b85e63d07a1b0cc7b1e0bfdebc95bf215
SHA2562388b58959e6b2ede83de6ff94c03254d0177863392fbe6c848616c72a259b11
SHA512f484e76a3a99f69adf1b7f273a5acbc8060a6e30f749adfee59fe613abbd05d2dbdcb4e444e004b21350665d078de07da4f112360a15c186c371e51111186a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587900c319914eaef91b1a956365183d2
SHA1db0cabb7b31a18fe22e30a071da39f1019fadbd3
SHA256ea4ae2787573508bb1a857bef5fd4a58eeb8f63947e706e2eb12cf52ed367df0
SHA5121421fb943d811682365c166e38a12786badd29dbafe2b0bbf9f43b736d3d8f18b90d37cbfb40d65301dacd24ef6e23b129b90e2c627ce5a1e1d977867ee86473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520cd29b3d1ad784a0dda6202bc2e54f
SHA158aa9d71bf47731ceed9dca8c681b8d4ef572fc3
SHA2561ce85f66ea68fb2ad90de7e893198f6703ccbf0e93c69dc4b491fc9134b04474
SHA5123249fe59e37bc8ff6276b39e2a872f70da74b5ef01077654bdff7ea7952d0523d89906e94c611bd12301f2bbb77d6fe897fe5028e01570be93b73f953b58aa71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f021b2e316cf4b008d2cc7324fa8c761
SHA1a0e831fedcbbbe7b8a96b5e31c936aa0a0eaa103
SHA2563606165e6c3a5d29b76af9b59b150fe16bf955f2a0e4ed6d76c885fe4d0c1729
SHA512f58be3f7dd359bd4addb9ad4e34c1f83d905d943414bcedc10163c3fb29c3cacfe28e2a9c194f81a951fa85939945f9823c0653df080a528551428f2b35e5389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e74adaec15f4b1c8cdae98238ae2e7b
SHA1f2fbfe9a5f8f588de2d856e353a999cbca73ba73
SHA25691a7fecc4de146959c38ae26444f135e385ea86f91fe9421fe7a4d029826eda2
SHA512cda1a27c94e4f8f790d90207576c1aecde44e37f76ac4d29ae8f32c4b5cd0ab8ee24e43328d22ad3dce85c6805698c69ce27bcb0429cb01a0bd456376c0b8f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f89a60dd78155da1461998ee515201cc
SHA1ac3745872a2d1234d8f76b78dd13f77c79b9ad1e
SHA25622a00f8ee4dda29a0cb7b51589efa5b26186b6ed9a6ad4800c7e8a8421e96b2d
SHA51291059bd134c4d5a16f02014b862d48095a83cefc1b70ffccba4bfe4c713d3a04935e35b85f3ce84b12a269898329a09d526118f8701b537aee47a40f194d2ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb553d4a7a93713b0d58e9c00985e795
SHA160817bbb6267ac7e7f37207a2c94aa0c4f10fa14
SHA2568a75cd0fd76ad997d5e4150519131449e1fd3f9cbb88a536ad6d5a90757bf020
SHA51272542ad86bb67aa190847daa4ea11fa9e0f86be2185344e771262a7b74f9c6b62233812275b21d1b9a96040323bfe58d4587d2a018e4d7b55dca691e7ffc76fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af1547edf3f09c892b65c0664b5dc11
SHA157a812ad628730151b5a89b6c7e1fb2ee5ca16a0
SHA256555cca62ebe0c7a3dafda1a15473ccd9fae902e515d46bd0e47996dc208d958c
SHA51239b29ea645fff5f8e0892841e98a2890ca614a15d200124a7e460d2b64e8a43936317e3c28d1c33b89839bbbdad84a04e27c4581e3ce787ea81dd7b7f5743329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc14062c8fc24fa8858b391d70a82c95
SHA1e4e9c94a034ebd44c0da403a82e80b2b99f44da1
SHA2560e38ed3d39da57f922f01766088f219120b5e410ec0e2b0c4ec764aa5a6ac53e
SHA512f76ee2449d155c6b48db34d44daffe615e6f609d11726c8892f0a973667e323e2ae65de915102b18869468b6d58fb2ea19bc7d83e1c0fd6aaf3b5cb87a60f55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8685c34e0b84830d2b8fb9e54df4821
SHA1e916b2de3358478142178cf106c39d271844eb98
SHA2560454d2a376276b6049f5f0a926b4cb07a02cc57786507d4533cf59796c71a804
SHA512b9ad0453a1d5acd4973eab3350242f94c7a59148a25a8b4bc6091aa7040b9d695553f81dedec3c914e661420159192578345066ee9b4bf4e1ad07a7c657c0b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e20069fcae918b08137ca951a5a4c42
SHA1bdbf96236eb4ff8614cc0c4b3a1f88a9bea0fdec
SHA256441cc79caba279bc56b2ed17285b0ffcd1d4e82a605115dac3fad1b3a29a323a
SHA51232d52e882518941cc227bdd852d21b045a125d5c1b157a4caeb3f4d5a8129a2400d113a1d8b08d3bf55c26eebe23e3b6d518d3bd25ae9c759cf291566321b22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b45a50398a367ef9c36eedcc48b7df0
SHA150536d434a450b04580488963793a54a15e68e2c
SHA256dfa9f4dd1441d12105d8716769d5feeb7fc5d52bb0fcf1faf7ef940aedfe071f
SHA512ebb46504c082bba242734957ab744d760924cd39d08a768eef967c5cb78a49f72e7b356a519641a49c4c3b9b2f2e5ed72c17b034f8eeae08f59a55a3091c2886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD5d2963434b8568a4edbf3e31ca606a49f
SHA1049a48d96acc5fa88457a3f4f09f977b74203620
SHA2565664cbf0634a67af9517bbbd71cec86bc474fa1da4c8100c222e93a911112373
SHA5126882b7d076451ceb694964ac38336322ba1608c707c55ddd95e31a702451bad6813c662743d0eb8b7874b10224665d731722eaa7835d4c4df20ba304169659ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize480B
MD543687511495a401224cac1a1a9111ce7
SHA159d3713d2ae364709a13fabade0ccd21342e92e0
SHA256c30835423fdd8b6d4598e6846716cf6b22cb7ffeb5d32f6a377e94c22b618864
SHA5123a1c910ab4740d721b6a89f226e7c12a93469171feaf46ef3d22c1215743f51c72be6e3df2ef80806130e9bb6a3664693f552174790d9fe1008a41b2868e4a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize480B
MD579f93aff6324bf9e4b62d7d3b5c375f9
SHA1dff60643720e11ad0fff23cae6c5ebfb4dc16d4a
SHA25636fa08eb43aea95a26a561cac9caf446c00aab6b1eff7d4c5137935b8a0fa11b
SHA5128b6f61dcd5e581e020ee90b2a7c91c0c0dc16a19606979b3e2ca4d7e8a1c41c0154859623e0cdd3a24690acf6ebcc65affe80b989a26486802799c9aaf8c1153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a7034b24d3a1e2e2c447f80a53e66274
SHA136d9fa1cc70cfb8c37aa04c8e1017149139dd153
SHA25615d6f60548fe3129a59b0ce29b236dd0eafded456d873e088422b6f96dd1c53f
SHA5120b620eec71b07abb7c782e7d800912469ab317ffa786658e01d9033838278deb1508aabab1c68429e9ff5ff088a8fdd8be94f61821305dca21bf97cd72377c80
-
Filesize
6KB
MD5e9d38f9e933cf774b235f26c9f3e394a
SHA19a63f57d7d58283d11e8b7e1b6f0da47d2361240
SHA256f918bae3738706430f6f96291b9d3d5440ae8e69cbc61573a2e3fb6cca1ed0fb
SHA512edb7388424a918680f44a773162b9044f2e2c487b074b456c14477b259e66f2cab769ceeb28c887b8cc9602fe07b268feab64901479ba3796524e92b6f41bfff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\Face_Gus_J-100x100[1].png
Filesize5KB
MD558e009cba0c9d95c03d950b1a06393ff
SHA15ae69dace1947564eed7e2237029a72336ad4a8d
SHA25666d3fa58a400974bcc636400e874462f7dfdde72f5394fa2ab9e2c7a0b605621
SHA5121083e26c139ccee12c2e686e1aa2c8764b3c95ab0ef25a69c437361c5b5989efcbb08ed71541d68016c6fce4e62894e94ae7b759c6ef617d257cf635c81668cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1488793075-819845221-1497111674-1000\0f5007522459c86e95ffcc62f32308f1_18cc84e5-41c1-45e6-bdc9-06ff0c9e128a
Filesize1KB
MD5145e8297cdeebdb6f8464e676547523f
SHA1861cfd4781c0b0bffd904ea3585f55b81d951c04
SHA256401ae7e3c46074baf023aae9aeca711707db79585aa7c9760f111d29fca2c8c9
SHA5123f888f05eb19e3c3e577c2252cbfe5040246528b760974e13cfcb62900383d067a6da40b6ce17d2c1068b7307d94a2bfd3ddd1a332694aa0bcdbfbf462fa673f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1488793075-819845221-1497111674-1000\0f5007522459c86e95ffcc62f32308f1_18cc84e5-41c1-45e6-bdc9-06ff0c9e128a.id-FBEE38E3.[[email protected]].AUDIT
Filesize1KB
MD5346a69afd77812f7586b4156ba9fd2e4
SHA17f36177126024ed70cc6b04764eda99bb64eed51
SHA25667499a41f0a1ff276b6469ef00a013c8a72b78c6f2a420a3ea3cb6b07268330b
SHA512115c23d87bc2dd3d60e0532b725621d0af08c69fa1078d7b6927cc99b8666ef7b10ebcee83949fafd84b9dd4b08290275a353e19c662da90ff1806b7a66aca77
-
C:\Users\Admin\Desktop\00357\HEUR-Trojan-Ransom.MSIL.Blocker.gen-7c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04.exe
Filesize674KB
MD5f55591a5277f1aa6f01b06480b2106be
SHA15e358b1279f76fb4b77a8642fbd3b4e6df0015dc
SHA2567c9fb073df87b696b896c9369f51b8478fb6c275d9f9ca40bdd2176ffe627b04
SHA512580979308cc72512bed3698f4a7f8fd521b700327110a81d6cc82d58555b220d004713ffc3577b7e8073f8f06c5a3e0f722d3d78f9733942ad60fc76287435f3
-
C:\Users\Admin\Desktop\00357\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-19035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461.exe
Filesize526KB
MD520024bcf4ec3f9f40a10bceb6e4bea94
SHA1ee5138094df672483d4509dca5ec4148eb852e15
SHA25619035c3e36b2411d450f304feccf9c7842064f04a4656817fc7a4df8431ba461
SHA5125b205f3b910cdcdbce0f8e953d31548b12f7f1865721a723a4d9812b7e52552e1f93d96bcde9bf5b9dd4fc3ea8f0e99937e11e7a6aa91577e4b5c6e6c6deb3c4
-
C:\Users\Admin\Desktop\00357\HEUR-Trojan-Ransom.MSIL.Generic-8bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25.exe
Filesize395KB
MD5452581491022fb552dc8db6c2825a1ea
SHA1b8c8208779e122765398e7e08f6a4e7c0213dbbe
SHA2568bdb76ff6b1764dbb11720e42e8fcb9da45d08831937fbbb860eb32340a02f25
SHA5129eb31c78ecafdbfbf86c9fc4d70bf7659c21881dc1955e3133482dd82d7ed94dc71b8dae114d46f78e154bbd6414ca7af41fc25a7be2a52f2b194a7e066fb313
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Blocker.abeh-76aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457.exe
Filesize104KB
MD5fe6ff7801f8880216f15bc8737401b56
SHA1ebfe8db8f1b7cfa69860c7996c89ae442d067a9c
SHA25676aa74ce385ecffa334b7ea66dc35ce1d69602e4e8dbd9f6f3b0aeba392e3457
SHA512f515438b4ca51894c2491ac9cb795d8fa8e2b69566df1a13ccec0186a4164fecb1e4523c07dfdeb47ab918b4d6873805d6c5cf29ca636c2f12d2c94ffc35b9a0
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Crusis.to-00d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e.exe
Filesize92KB
MD50c2b066f9bb0ed1c3d68f0e13d5eb318
SHA1d2dd88da8ca9b33389a62c474d8b0c944b46b1a7
SHA25600d290adbb184cb52ee6a6cae7c4a3b02edcda1f99acfadf1fbac11c44ed081e
SHA512f8e8d40392b1c456ec5d4f21a99deccf880ab0e1ca43bb6c70310e07906b5acc188238b15a67afd60db6e0b89de3ebd3a52269f2a09d27079581c18dfda27470
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Fury.lf-3d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511.exe
Filesize132KB
MD5b7615c33349699758035fa509676b693
SHA1362852d8a008f3e59b1d2194f7edb9923bada349
SHA2563d615c210addb2672e40b291c2bf7f322955e7df475512a60d682ef1110ff511
SHA512f3037dfe5bd166babd632551568c9c0d337520eca01de45f046fd6321d03e09b1f57a51ced57535ead32088f2820ee1b4da7ab6d63e33dc7464b3124f9608b50
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Shade.pkq-3fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229.exe
Filesize1.5MB
MD5c13629942b30c7773b827380a7ffc045
SHA11c0127290effd2571710cef81b95bee140a99f7f
SHA2563fe4d9fa4f05d8d12333821a43f91e25bd32f07dc00983183289acffe6b2d229
SHA5126e188f90eaa811fca22a646c1ed17266647f931a05166218df002e5d51168f2eb1a5ce3a9881baf51126087a6793d8cc0d9c5b0a51296cc27257903e93eb6d11
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Shade.pnz-e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06.exe
Filesize1.5MB
MD51ec2b809dcc74dd7ce9f5add538d17c5
SHA164cb43718e6be2378658b699c6bd0a4d69716fd3
SHA256e7c9ba307b5afd0381954fa6d59b5a7b2bc73eb6e63f825336fa8429eb5e6f06
SHA5124e8e2e4db1db75cbc3f4068053184b71379b36be23e767aebbe92f658335c98981844829ede30f5c14e417ef144c3217c9d91a86cd736910bbd5b7b8c29c83ea
-
C:\Users\Admin\Desktop\00357\Trojan-Ransom.Win32.Shade.ppg-1c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79.exe
Filesize1.4MB
MD5676740f0607965d86455d5f16e364c1a
SHA1b0762362d89342778cf6fe6bf5f34809788231d7
SHA2561c06b518a94ad6db106d7d31626f2a7c80bd03f0dcd6d0bc450ffac1750cdf79
SHA5123c0e6c476b5ddc12f9c3d37baf3328fe28de5a5251b961406989e8fd8f2d89c51926c7fb406f76bc9719d6a657d97e6afe91184af23473d3aee8301ffb8baa39
-
C:\Users\Admin\Downloads\CloseRegister.dotx.id-FBEE38E3.[[email protected]].AUDIT
Filesize467KB
MD58bfb34b51909f5b18cf9603b257e7427
SHA18beb5e6104bb847c23f2ae493c26ead8151a10e5
SHA2560b25d7fc338a4230cabd4f746235ccb6bd35085e321bda29b44ea94ed8884ebb
SHA512ac4fbde49f47b676f5a02a56d3c62c871d28c577563513fe3a6c0f23fd446c7826290cdfdeb1cea2e4097e47547358359e94ea843150d445be62306abcf69ad3
-
C:\Users\Admin\Downloads\CompleteConvertFrom.mpg.id-FBEE38E3.[[email protected]].AUDIT
Filesize351KB
MD5aa75ffe1cf3400572f5ba6543232e2d4
SHA104e49dd8554db9f9488a6c21d1d041787fa8bc6b
SHA256b3425ceb51b885594019dda77484fb32daf615d55119b87be31a1ccbdf818d84
SHA512f48e744373bff7f99d9f0e17151b71775c1f3ea66c7f379254f87497e715c2b2dd6fca884f17822afa7ed1037993002d5b1a1073abd606cb79d0fb810b0c774e
-
C:\Users\Admin\Downloads\CompressStop.dotx.id-FBEE38E3.[[email protected]].AUDIT
Filesize253KB
MD5fece6600df28ba9acea9ac22faeb880e
SHA16b5de9449e6d6911f7d3a9b50f632d621b2e98c3
SHA256e8fded418c8ce795b3e8298760d0256db291a8949b111d447b7e09213b013233
SHA51237ca1deb3fb217ad7a3097b2e977e41510d6a96d6132f419070b69ca307b884f7ca2adc3cadfc67cec63010d788cea291ad1d3a2e40275c36981d9a769ca5403
-
C:\Users\Admin\Downloads\ConfirmCompare.gif.id-FBEE38E3.[[email protected]].AUDIT
Filesize360KB
MD5c8abd884d958fc83612d6275c486de14
SHA144593824e94cdac5a497b59d1017bfff4cb8a650
SHA256969cd9b073627bb8a9bbdf700749b5df5f058064a76fa2c90d64132cf7b9dd90
SHA51239b5537a3ad78ac24074de94147c547420cafd8353712c25a8ec4fddcf895ab297249914d3aefa26b4cf890e0061ef8f25bb8d58a2f1c1547eeac54b7d80e735
-
C:\Users\Admin\Downloads\DebugMerge.dotm.id-FBEE38E3.[[email protected]].AUDIT
Filesize341KB
MD520975d76e2b0689d6370c6cd1122c0c9
SHA197a413920c69860fef92af7a598fb62af5b61e0f
SHA256bace570d80868be539c9fd86f2eae2133c6f4de133b00d4d6a91618846395696
SHA512bb27b7e5a850e1fc8877e73467870af047afeb36fbf2cba62c134941cc165278863961e2f8f4da76161a0c92ae998549af5f34102f58b60f8a0517f2dbed7a26
-
C:\Users\Admin\Downloads\EditBackup.eps.id-FBEE38E3.[[email protected]].AUDIT
Filesize263KB
MD5a8b01a694b458c2e56b67679f9f51ed7
SHA1988a61ac645f40d75ab29890eadb34350979c737
SHA25693549fdaeb90207205fb1d4482b56166ddc1b1786b63e84d6424ac34dbef8566
SHA5128f0d206f45a02c67eef83b2e2af6d219e09814a3fe5c4f0f206074940346821fe638d0971206dc065076a024258f0548ea0ca59c5935bc0c1e7f12c2b6c8643c
-
C:\Users\Admin\Downloads\EditWrite.docx.id-FBEE38E3.[[email protected]].AUDIT
Filesize419KB
MD5cd1f7913e395aca4de31bb31c76b5086
SHA19577cfedd16a16865b541f66320456e27fc533dd
SHA256fe60e15847f9838df07bdab29608b2979c6207c48997a9f6fd66178112d86210
SHA51232ee61ecfddb1a6a89692b11a28f5952c7cae10a1c83453b08bf857e9378583611f13d786a11ddcb4a92a7a10588f85c65381ec979a3c512de636fc6a2758a11
-
C:\Users\Admin\Downloads\GetComplete.txt.id-FBEE38E3.[[email protected]].AUDIT
Filesize302KB
MD5e482ff200c73b2dd3356a3060354bd46
SHA1adc8cd15bd76614b31e0832c2e2448c383eb96a1
SHA25663cb2b1df5e6ad8dbff3c719349c9c62b280f1b5b16d2624abb26ae1e91745d2
SHA512f7df24e868ec348fbbc1d549ff31c81fa8a00a026082bac0f2d04f38251019d76efa52c93845da81ddc18fcf50f31a3a987bb7d9c2012d2863c40d9cd8d1c750
-
C:\Users\Admin\Downloads\ImportClose.html.id-FBEE38E3.[[email protected]].AUDIT
Filesize204KB
MD5b01a7590e5f2b85f5457929d2e1aed0c
SHA11f090bf87c7b292fa39ae22fe5ee2999d71ba15d
SHA256d703d8aa93a553cdc48738cd6a65c6ebc7758d0ed7f7dc8dd3c74e69d6b75252
SHA512c59e91b90d06585f10ef2e654384243250978ed6950d851bd42a1bb935a5d3c065731f2e7a0b72e7a6449f75f21589c1ba16b9ffd2a36906a6f99e8b1a80b89b
-
C:\Users\Admin\Downloads\ImportDebug.png.id-FBEE38E3.[[email protected]].AUDIT
Filesize321KB
MD5782b0d3ac6d675d75fd082bd4628cbc0
SHA11b088bfa1633e69d3ecd11352b6f07d9a49802e3
SHA256cf5dfa9a900123ca3b8af61309e1e4eb58fe874308cee4190fa78635dc5b223b
SHA512ffbfe401f483e7905cff4804e403d8c004ce96c1605e86a9e8562c50dfca995d1dc5119ed7a5b0a8d11057cc18c0189a327abe199dff4e70bf407a553aa528dd
-
C:\Users\Admin\Downloads\NewFind.mp3.id-FBEE38E3.[[email protected]].AUDIT
Filesize282KB
MD52d1e60f4c3cbc20da41153a7403e80fe
SHA1fb4084b1eeef0728c9c81922f2a7332c5db72944
SHA256139e46ee36649dc8d4da2702ecb99f1ff383b7453b93193cb2b64b27891be15f
SHA5126f24d26a5b202832c527b543bc94e1a53563aba3f516b8fe49c5fa3190b33c864848f2270fd6b15f3bed752e4451e7663c9905319e37cd822c022d91e6322ae7
-
C:\Users\Admin\Downloads\PingApprove.asp.id-FBEE38E3.[[email protected]].AUDIT
Filesize438KB
MD58a37601f3c5621917add4d7a7a3cefd2
SHA1a3df7aea983aa3aaa4d388c225337e22f62fb220
SHA256a8179374d0448fc134dd90c75eb408a091b1625972a546e2f37bbcbb340b7c27
SHA512f6057c62ef59d64789ae393e62471e74aa4019d83eecf046fabdef538b0337b822a4ce02c718a60ee8190e1ebdeb0161e3d76aa08df876e9147a943331da618d
-
C:\Users\Admin\Downloads\PopHide.vsw.id-FBEE38E3.[[email protected]].AUDIT
Filesize428KB
MD5dfe3511d84a457908189cd039b00b9c2
SHA1908d48a9f22e928b8cf88293e6a4710f908dfaf2
SHA256f8eb193a726a828bba68d0904372090fe982834e64fe95859ba0fe8294475f07
SHA5127c4c59e4c9e3c0a9ee08b62e9950bd36c363ee0657413edfcbbd451a0aef3a3228586014e07571619cca41627e76367c9537ed0cf2c477de93be305d9edcf7fd
-
C:\Users\Admin\Downloads\PublishUpdate.wps.id-FBEE38E3.[[email protected]].AUDIT
Filesize243KB
MD5f180fcd3d6b8684892888451cf76ea17
SHA14d2a91d2d223e4f48143ffb4ea0240309f8a928b
SHA256bff71cd7be931d4fd9f21fa9c87f5353ffc243bed09f176ebae6a4e0048f404e
SHA512bad151f84f83e1a8febcdedd2a3699e8f10da302ea9d496eb5124ab4da9d9b43cafa7825fe47c43e3cb12daf4f62b6dd0545bc505cc4855579df0b649707663c
-
C:\Users\Admin\Downloads\SearchWrite.xps.id-FBEE38E3.[[email protected]].AUDIT
Filesize477KB
MD5a356d3af7e7186dfbbdd66be5a818f81
SHA1834aae556c44a5699be55ff7cb29d9a624e2b708
SHA2567a2c2f96bd0591b229e37b3c0ece09543151c6b321767d18d0de1f3dc5209d2c
SHA51257d0d2947878f2007d693ca47c9195d761a2abf769ac027fe419d4fedd0769b33d9b553feb15e680103571aabdf6ef3927e28b666d1beb7737bb696035507cc4
-
C:\Users\Admin\Downloads\SuspendReceive.xltx.id-FBEE38E3.[[email protected]].AUDIT
Filesize214KB
MD54cdce79db2a872e96dcfd90252dac5bf
SHA123c5c5c7187422442c942e44602e63a246823445
SHA2566e059f0d3c2db3e67e84f8ba833198639812ecff886f7e5e57de6cf04312f096
SHA512e23763afe284dcec4d48783e67ca32979000bea795fb280a09a3ce4225a98aa708041e8e08156c2bc200b105701c7d28e3a659a20e5775c661dd309e1a3b74f7
-
C:\Users\Admin\Downloads\UnblockUninstall.css.id-FBEE38E3.[[email protected]].AUDIT
Filesize224KB
MD5915efcbcd86dc1dd8f5dd1e4a883db55
SHA1fa35bd4690934fcdac831c16c67cf705db975d5c
SHA2566ad9a2fd57ed75964366dd929a29cd527f386b43dd57fa75f529f3dedd70ab82
SHA512cb3d6fe76aea219d920f30960d5b9f4c7aeb4952a0b3f4bda222f68771e1e45cde2e1aea1761b440f6ce684c865047fa66284a30a9ea77d95cfc24804c61d270
-
C:\Users\Admin\Downloads\UnlockSend.vdx.id-FBEE38E3.[[email protected]].AUDIT
Filesize312KB
MD570a5f7fca4e26cc3bee3555ce087506f
SHA1514f8cf48cbfc4544c5f195ef01dcf062cfb4609
SHA256cd0926b1c1e685edd418476a1b33b88e1518f4bc57607ea5e61d42d76baf223b
SHA512365e5a19b6213c6bc166ee11ab71f2829cbfd497de8e438f589ec09c59c99b91363144234468fa23e31b7a8d3dc6e38aad6c0f36a37bea6765a8fb7cd4bc48b3
-
C:\Users\Admin\Downloads\WatchStep.3g2.id-FBEE38E3.[[email protected]].AUDIT
Filesize195KB
MD52fb9fd7a9bdcebb3634546cb8509b527
SHA1584f727e499b75e44a1af0b48a5ab77b0d8d6f7b
SHA2563d47c1012613fe74872dac1134b2be6d63bd20ca1224fba569611d86e924f638
SHA512bdc3a9576ecbec8f6911f198bdb5649d02db63b210333aa95cf88d6ec21c80dd6f324205ad8559518fc2f023515ef0eade598ab533997ef5e0d7b8925f7ae548
-
C:\Users\Admin\Downloads\desktop.ini.id-FBEE38E3.[[email protected]].AUDIT
Filesize522B
MD5dc212d1e761f769cd999e2d9e6bf9ed7
SHA1fe7f9fd6bae3d07138d426c011046befa1018400
SHA256cf929d657479864a245d8e3da9251208eed6fe987b1ae3c2c2d9de3562994f50
SHA51215962c5cb166d245329995d8b11acb8f6b4ca5acf44e611df50bb61743bff949120041df9904aceaa892a975dabe7d5bbdbbf017a9b9925bb445029b84ec4f0e
-
C:\Users\Admin\Favorites\Links for United States\GobiernoUSA.gov.url.id-FBEE38E3.[[email protected]].AUDIT
Filesize394B
MD545fd0ce63fca1279123e926d043cdb19
SHA15a6a2879c56e440c1bc58950b270ec844594b651
SHA25632ae448fdfc7132e170f01d68d6f9fe13cf36ba858448ff3dd6c9e725484e28c
SHA512a924ce92988bdcc6ae1f430c7120ca2e3eec74f6ec792251327a303716ff94c656ca67e73209689081d6572481b79fd85284e768307bdf1211048ae8e128cc24
-
C:\Users\Admin\Favorites\Links for United States\USA.gov.url.id-FBEE38E3.[[email protected]].AUDIT
Filesize378B
MD57ea340902abd567a6c2a4aa3bb51c6dc
SHA12cf9c3d5032c2f70918b7e1b0f5b4bb7fddc28c3
SHA256bb8fae8a273e2bf2529619665213ad801a4ee973a7c5e0373b82d512cdaf41e1
SHA512d1b187ed4848bd80bd7e69e4ffc9ebe19b0d2af3e86607e73a75776be4fbc3ad8bdc28da76a48124d7f9f123c91a2bf400cafa79b75189325c3e587bf25cbbc0
-
C:\Users\Admin\Favorites\Links for United States\desktop.ini.id-FBEE38E3.[[email protected]].AUDIT
Filesize474B
MD51392b6cf7fd5b44c5baf310d8d7d5d10
SHA174e0cc54756ccee2094033c13f87d87c8286aa05
SHA256fe7d2040c64de438e8f3b30b67986a5160521489bc6eec6befdd5a483cc3ebc4
SHA5126ec5de673abe16cc61f7b8e031946b25de901329e84378e7d7988442c190c929445f02eb06bb47545ca8dc9ab23af53b14e33b299f9cbc4b7be046bee9e6cac9
-
C:\Users\Admin\Favorites\Links\Suggested Sites.url.id-FBEE38E3.[[email protected]].AUDIT
Filesize490B
MD58e1c7ec4bf92f417951a75811ee4c86a
SHA1e9eb299ab732138affdf6f8e648c4e86024c60c2
SHA2563869916091e974fea047736ae8f52192bc9860876ce115fed0d697530804a187
SHA5125745bf9ee8ac01af4690be84797340ad829068b827d6a3b5d1b8c20685f3ee9055a9e8aa8baf3384fb9b407c2509ae65189ee2f72fa89b93feb43e5215191c67
-
C:\Users\Admin\Favorites\Links\Web Slice Gallery.url.id-FBEE38E3.[[email protected]].AUDIT
Filesize494B
MD536d3d3acbb2e2dcb7c7a99228ea87335
SHA127fdbd13ef4884bfa2af8e4d5df659ae7fb0fb6a
SHA256e3864444d91ce14e976ac4085cce698ad0265d5a87d5029f4ac9a12aa423ec32
SHA512b503927e8f206077cf0dec6753ccbde79ceeee86be9f162a46a66e001b247d44ee8a03939da69d1920b07958b754d9855df89b9e8787c7eceffce08d651e6f07
-
C:\Users\Admin\Favorites\Links\desktop.ini.id-FBEE38E3.[[email protected]].AUDIT
Filesize330B
MD5d231e86f043449eac2b92e110dca09cc
SHA13118c872614ae66a614dc99c129e054a50348f5f
SHA256f6c2094737da2994b4f279862b28b9269c60a9b7107d03eab646e519aabcb67a
SHA512cfbaaae1046a9989110e37b70ac58dd171dff9c0ea0f21551aad8c36c4f6d6570f12fec1912b1651d0e9278c346e6c919b672d656be901b97d7e1f3c89593880
-
C:\Users\Admin\Favorites\Microsoft Websites\IE Add-on site.url.id-FBEE38E3.[[email protected]].AUDIT
Filesize392B
MD57cf00b7d24c6c0f856f8dabf31c3604a
SHA13dcc426ff1d1e2f8df0f0f6f1281158810c7bb7a
SHA2563bd2a77c3ef6553669881dfd95c32aac5d105917c1de0ff6ed068e87159ec0f4
SHA5125f22b5ddbc22b49e23312b547de05d06e9ea215ce9a8aabf46a30dfab0e2eea6c20f480e8b5d5bf7424672c2e27f8cdc366e75ccc492a84825a454570fadd989
-
C:\Users\Admin\Favorites\desktop.ini.id-FBEE38E3.[[email protected]].AUDIT
Filesize650B
MD51dec1abbeae0e0e1695ae9a831785a56
SHA1a9d94fb389d7f4384e5818b4f88fce8c2ba5f1e8
SHA2568d43fccad82b222be1e0757bceb3a3787cb6d083853f23fbb4484268ce4fc0ed
SHA512fd15deebaeda02decca58ca98be471c0263b4c57ac99c7e27e54dd5df7f8783e4291d49905628393462f3654319ac888244ab101a270cf771e6862cb9532a109
-
Filesize
64KB
MD57afc07941d85db2159fee936c01e9316
SHA11cccf07c51ce298749aa0400c7b08f01792d3856
SHA25624cc0fed5e6f6daa0b3f8f1bf1515e13a028d13611764add031d1a4e05efdb52
SHA5129b0b204bba012cc29a1481f5b43b675cb4256243b35b93c7578deadcc9baa432fcf7a51d84deb4e4bfebf6f8987d1805343981c8b3e9d01d85f3ec09e2f3aafb
-
C:\Users\Public\Music\Sample Music\Kalimba.mp3.id-FBEE38E3.[[email protected]].AUDIT
Filesize8.8MB
MD5c6b97d3d2cef82e614c7174ea3b15f45
SHA19d9135d35398f332bed89095306dc220eefd90b4
SHA256adefa8fbdfc9f781087c76a765b9e82af262e8b862ffeaf07f2f7d89bbf888ef
SHA51212d5db58de3cbfec5ac39dd1542e55e0df7804649a7b3a67d9e0236a485c51fa399a9b2907f431b49d25a36fafd164faf718c5fb7f0d0d9e0ae3fb1409df6a2e