Analysis
-
max time kernel
211s -
max time network
212s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 16:01
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00346.7z
Resource
win7-20240903-en
General
-
Target
RNSM00346.7z
-
Size
7.8MB
-
MD5
dfcfe5e31652e77e5ce8e1147352b153
-
SHA1
72b3a2b3db894426a1a31606a475aede7cbe546a
-
SHA256
d9ee637eb3e5c900c4997f3d2dbe86883a86fa32064cf9f29d227fca7d9d429d
-
SHA512
7d1d4693c5f85c354f784814b51ec955a834eba6e0d063138ffbaaf3ac7c7ca9dcc69cf90b1df6cff9edab9505e48f79ab4c05ba39f83da43da526ef92dfeb1f
-
SSDEEP
196608:YFX30UAEo6Pd5lpAYoP8J9sTVPjz3izEbKPCHuvFFioCHr9nKM:YFX3plGp8J+TNjTizEbKPPTanx
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
strongnetwork2020
Extracted
F:\$RECYCLE.BIN\SQAEVMXZ-DECRYPT.txt
http://gandcrabmfe6mnef.onion/1786662e82c401c
Extracted
azorult
http://admin.svapofit.com/azs/index.php
Extracted
azorult
http://allods-down.site/yumi/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Hawkeye family
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe HelpMe.exe" HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/804-1542-0x0000000000480000-0x0000000000510000-memory.dmp Nirsoft behavioral1/memory/1012-4193-0x00000000026A0000-0x0000000002730000-memory.dmp Nirsoft -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/804-1542-0x0000000000480000-0x0000000000510000-memory.dmp MailPassView behavioral1/memory/1012-4193-0x00000000026A0000-0x0000000002730000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/804-1542-0x0000000000480000-0x0000000000510000-memory.dmp WebBrowserPassView behavioral1/memory/1012-4193-0x00000000026A0000-0x0000000002730000-memory.dmp WebBrowserPassView -
Renames multiple (2032) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (294) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral1/files/0x0007000000017403-36.dat aspack_v212_v242 behavioral1/files/0x000500000001929a-62.dat aspack_v212_v242 behavioral1/files/0x00050000000194df-114.dat aspack_v212_v242 behavioral1/files/0x0001000000000028-152.dat aspack_v212_v242 behavioral1/files/0x00050000000194df-148.dat aspack_v212_v242 behavioral1/files/0x000200000001067f-1279.dat aspack_v212_v242 behavioral1/files/0x00020000000106e5-1281.dat aspack_v212_v242 behavioral1/files/0x000800000001033a-1284.dat aspack_v212_v242 behavioral1/files/0x0002000000010676-1305.dat aspack_v212_v242 behavioral1/files/0x0002000000010459-1307.dat aspack_v212_v242 behavioral1/files/0x000200000001044f-1303.dat aspack_v212_v242 behavioral1/files/0x000200000001044b-1301.dat aspack_v212_v242 behavioral1/files/0x000200000001044c-1299.dat aspack_v212_v242 behavioral1/files/0x0002000000010673-1297.dat aspack_v212_v242 behavioral1/files/0x0002000000010672-1295.dat aspack_v212_v242 behavioral1/files/0x0002000000010320-1293.dat aspack_v212_v242 behavioral1/files/0x000200000001031f-1291.dat aspack_v212_v242 behavioral1/files/0x000c000000010323-1289.dat aspack_v212_v242 behavioral1/files/0x000b000000010324-1287.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\SQAEVMXZ-DECRYPT.txt Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\82c47f182c401172.lock Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\SQAEVMXZ-DECRYPT.txt drpbx.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\SQAEVMXZ-DECRYPT.txt.fun drpbx.exe -
Executes dropped EXE 20 IoCs
pid Process 1676 HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe 1128 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-93258bd4b3ff675544ab3d79ecd6bd12c1beca4f0e391e18d03889128c7b7a9d.exe 1368 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe 1252 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe 1488 HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe 1380 HEUR-Trojan-Ransom.Win32.Generic-4ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a.exe 2856 Trojan-Ransom.Win32.Blocker.ldlo-b49b9a4bcfc90200223c824e09bf9b27b5de055da0c32932214f7d11632b1804.exe 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 664 Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe 2524 Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe 1712 Trojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exe 1612 Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe 2472 drpbx.exe 804 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 1792 Windows Update.exe 2720 syncserver.exe 316 jucheck.exe 1012 Windows Update.exe 1572 syncserver.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe -
Loads dropped DLL 10 IoCs
pid Process 804 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 1792 Windows Update.exe 1792 Windows Update.exe 1792 Windows Update.exe 2120 cmd.exe 1712 Trojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exe 1792 Windows Update.exe 1012 Windows Update.exe 1012 Windows Update.exe 1012 Windows Update.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 syncserver.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 syncserver.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 syncserver.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PremiumOs2 = "C:\\ProgramData\\Microsoft\\Windows\\PremiumOs2.exe" Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jucheck = "C:\\Users\\Admin\\AppData\\Roaming\\014f411da4023b0b3ad528fdd7fa014a\\jucheck.exe" Trojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\Downloads\\syncserver.exe -boot" syncserver.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe -
Enumerates connected drives 3 TTPs 47 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\V: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\A: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\B: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\L: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\W: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\K: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\M: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\P: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\Q: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\O: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\I: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\O: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\R: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\M: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\N: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\T: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\X: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\G: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\N: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\E: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\H: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\B: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\H: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\L: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\Z: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\Q: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\R: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\Z: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\F: Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe File opened (read-only) \??\S: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\Y: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\G: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\I: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\U: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\E: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\U: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\J: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\P: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\S: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\Y: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\A: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\J: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\W: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\X: HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened (read-only) \??\K: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File opened (read-only) \??\V: Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 124 whatismyipaddress.com 126 whatismyipaddress.com 127 whatismyipaddress.com 314 checkip.dyndns.org -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened for modification C:\AUTORUN.INF HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad.exe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File created C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\pidor.bmp" Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1488 HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2604 set thread context of 804 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 52 PID 1792 set thread context of 1012 1792 Windows Update.exe 74 PID 1012 set thread context of 2240 1012 Windows Update.exe 78 PID 1012 set thread context of 788 1012 Windows Update.exe 80 PID 2720 set thread context of 1572 2720 syncserver.exe 83 -
resource yara_rule behavioral1/memory/2524-75-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2524-74-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2524-73-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2524-72-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2524-79-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2524-77-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2524-3036-0x0000000000400000-0x0000000000607000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\divider-horizontal.png drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt drpbx.exe File created C:\Program Files\Java\jre7\lib\management-agent.jar.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPOlive.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\notification_plugin.jar drpbx.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogoCanary.png.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core_zh_CN.jar.fun drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\highDpiImageSwap.js drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7TSFrame.png.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-io_ja.jar drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-attach_ja.jar.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Apex.xml drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.nl_zh_4.4.0.v20140623020002.jar.fun drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_windy.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.commons.logging_1.1.1.v201101211721.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_zh_4.4.0.v20140623020002.jar drpbx.exe File created C:\Program Files\7-Zip\Lang\he.txt.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Flow.xml drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)grayStateIcon.png drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\localizedStrings.js drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-favorites.xml drpbx.exe File created C:\Program Files\7-Zip\Lang\ro.txt.fun drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref_PAL.wmv drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler_1.2.0.v20140422-1847.jar.fun drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\library.js drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\attention.gif drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_increaseindent.gif.fun drpbx.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\34.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench.nl_zh_4.4.0.v20140623020002.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-plaf_zh_CN.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-api-caching_zh_CN.jar drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single_orange.png drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\redStateIcon.png drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\library.js drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-favorites.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\UnreadIconImagesMask.bmp.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\com-sun-tools-visualvm-modules-startup_zh_CN.jar drpbx.exe File opened for modification C:\Program Files\CloseCopy.xlsx Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe File created C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveDrop32x32.gif.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.xml.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-api_zh_CN.jar drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management-agent.jar.fun drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\btn_search_up_BIDI.png drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_AutoMask.bmp drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\UserControl.zip drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\THIRDPARTYLICENSEREADME.txt.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jetty.util_8.1.14.v20131031.jar.fun drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\settings.js drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\macHandle.png.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\InactiveTabImage.jpg drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_de_DE.jar.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-masterfs-nio2.jar.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodicon.gif.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_ja_4.4.0.v20140623020002.jar.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.nl_zh_4.4.0.v20140623020002.jar.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core.nl_zh_4.4.0.v20140623020002.jar drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher.nl_ja_4.4.0.v20140623020002.jar.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_zh_4.4.0.v20140623020002.jar.fun drpbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-4ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jucheck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.ldlo-b49b9a4bcfc90200223c824e09bf9b27b5de055da0c32932214f7d11632b1804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.GandCrypt.gen-93258bd4b3ff675544ab3d79ecd6bd12c1beca4f0e391e18d03889128c7b7a9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syncserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syncserver.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b1bb268a33db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d12e670df8a0440ad0d9950f45ea95b000000000200000000001066000000010000200000000992785a2d31fc2deb1ac5799cf462162f035771f8e01de5eb2cae5dca03b210000000000e8000000002000020000000e4472650e943bcb0c549e433aa5f14a14c85a0dc590a854bf419ea6147c09d8020000000165797561cfdd9248e82036638d14dbc978e2994c5f78fbc8b75d47089415329400000004ab8f621992495c6b92b94740fa20630d637b4d78b55d1960e9609c8bf44c66db4f3147080c3b5e912ab444436f12df6b6c87a4149f773ecf1f6341251b3eea5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437416456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{474F1C31-9F7D-11EF-BB31-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 0f00000001000000140000000f6aad4c3fe04619cdc8b2bd655aa1a26042e6500b000000010000005400000053007400610072006600690065006c006400200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f007200690074007900000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b06010505070303140000000100000014000000bf5fb7d1cedd1f86f45b55acdcd710c20ea988e71d000000010000001000000090c4f4233b006b7bfaa6adcd8f577d77030000000100000014000000ad7e1c28b064ef8f6003402014c3d0e3370eb58a2000000001000000130400003082040f308202f7a003020102020100300d06092a864886f70d01010505003068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137333931365a170d3334303632393137333931365a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100b732c8fee971a60485ad0c1164dfce4defc80318873fa1abfb3ca69ff0c3a1dad4d86e2b5390fb24a43e84f09ee85fece52744f528a63f7bdee02af0c8af532f9eca0501931e8f661c39a74dfa5ab673042566eb777fe759c64a99251454eb26c7f37f19d530708fafb0462affadeb29edd79faa0487a3d4f989a5345fdb43918236d9663cb1b8b982fd9c3a3e10c83bef0665667a9b19183dff71513c302e5fbe3d7773b25d066cc323569a2b8526921ca702b3e43f0daf087982b8363dea9cd335b3bc69caf5cc9de8fd648d1780336e5e4a5d99c91e87b49d1ac0d56e1335235edf9b5f3defd6f776c2ea3ebb780d1c42676b04d8f8d6da6f8bf244a001ab020103a381c53081c2301d0603551d0e04160414bf5fb7d1cedd1f86f45b55acdcd710c20ea988e73081920603551d2304818a3081878014bf5fb7d1cedd1f86f45b55acdcd710c20ea988e7a16ca46a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100059d3f889dd1c91a55a1ac69f3f359da9b01871a4f57a9a179092adbf72fb21eccc75e6ad88387a197ef49353e7706415862bf8e58b80a673fecb3dd21661fc954fa72cc3d4c40d881af779e837abba2c7f534178ed91140f4fc2c2a4d157fa7625d2e25d3000b201a1d68f917b8f4bd8bed2859dd4d168b1783c8b265c72d7aa5aabc53866ddd57a4caf820410b68f0f4fb74be565d7a79f5f91d85e32d95bef5719043cc8d1f9a000a8729e95522580023eae31243295b4708dd8c416a6506a8e521aa41b4952195b97dd134ab13d6adbcdce23d39cdbd3e7570a1185903c922b48f9cd55e2ad7a5b6d40a6df8b74011469a1f790e62bf0f97ece02f1f1794 Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945\Blob = 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 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\7E784A101C8265CC2DE1F16D47B440CAD90A1945\Blob = 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 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 12 IoCs
pid Process 1368 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe 1488 HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe 1128 HEUR-Trojan-Ransom.Win32.GandCrypt.gen-93258bd4b3ff675544ab3d79ecd6bd12c1beca4f0e391e18d03889128c7b7a9d.exe 1380 HEUR-Trojan-Ransom.Win32.Generic-4ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a.exe 1252 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe 2856 Trojan-Ransom.Win32.Blocker.ldlo-b49b9a4bcfc90200223c824e09bf9b27b5de055da0c32932214f7d11632b1804.exe 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 1712 Trojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exe 664 Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe 1612 Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe 2524 Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 1252 HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe 2560 taskmgr.exe 2560 taskmgr.exe 2524 Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe 2524 Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe 2560 taskmgr.exe 1488 HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 1380 HEUR-Trojan-Ransom.Win32.Generic-4ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1612 Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe 2560 taskmgr.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1572 syncserver.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeRestorePrivilege 3060 7zFM.exe Token: 35 3060 7zFM.exe Token: SeSecurityPrivilege 3060 7zFM.exe Token: SeDebugPrivilege 2560 taskmgr.exe Token: SeDebugPrivilege 1368 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe Token: SeIncreaseQuotaPrivilege 1852 wmic.exe Token: SeSecurityPrivilege 1852 wmic.exe Token: SeTakeOwnershipPrivilege 1852 wmic.exe Token: SeLoadDriverPrivilege 1852 wmic.exe Token: SeSystemProfilePrivilege 1852 wmic.exe Token: SeSystemtimePrivilege 1852 wmic.exe Token: SeProfSingleProcessPrivilege 1852 wmic.exe Token: SeIncBasePriorityPrivilege 1852 wmic.exe Token: SeCreatePagefilePrivilege 1852 wmic.exe Token: SeBackupPrivilege 1852 wmic.exe Token: SeRestorePrivilege 1852 wmic.exe Token: SeShutdownPrivilege 1852 wmic.exe Token: SeDebugPrivilege 1852 wmic.exe Token: SeSystemEnvironmentPrivilege 1852 wmic.exe Token: SeRemoteShutdownPrivilege 1852 wmic.exe Token: SeUndockPrivilege 1852 wmic.exe Token: SeManageVolumePrivilege 1852 wmic.exe Token: 33 1852 wmic.exe Token: 34 1852 wmic.exe Token: 35 1852 wmic.exe Token: SeIncreaseQuotaPrivilege 1852 wmic.exe Token: SeSecurityPrivilege 1852 wmic.exe Token: SeTakeOwnershipPrivilege 1852 wmic.exe Token: SeLoadDriverPrivilege 1852 wmic.exe Token: SeSystemProfilePrivilege 1852 wmic.exe Token: SeSystemtimePrivilege 1852 wmic.exe Token: SeProfSingleProcessPrivilege 1852 wmic.exe Token: SeIncBasePriorityPrivilege 1852 wmic.exe Token: SeCreatePagefilePrivilege 1852 wmic.exe Token: SeBackupPrivilege 1852 wmic.exe Token: SeRestorePrivilege 1852 wmic.exe Token: SeShutdownPrivilege 1852 wmic.exe Token: SeDebugPrivilege 1852 wmic.exe Token: SeSystemEnvironmentPrivilege 1852 wmic.exe Token: SeRemoteShutdownPrivilege 1852 wmic.exe Token: SeUndockPrivilege 1852 wmic.exe Token: SeManageVolumePrivilege 1852 wmic.exe Token: 33 1852 wmic.exe Token: 34 1852 wmic.exe Token: 35 1852 wmic.exe Token: SeBackupPrivilege 1672 vssvc.exe Token: SeRestorePrivilege 1672 vssvc.exe Token: SeAuditPrivilege 1672 vssvc.exe Token: SeDebugPrivilege 2720 syncserver.exe Token: SeDebugPrivilege 1012 Windows Update.exe Token: SeDebugPrivilege 316 jucheck.exe Token: SeDebugPrivilege 1572 syncserver.exe Token: SeRestorePrivilege 1152 7zFM.exe Token: 35 1152 7zFM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3060 7zFM.exe 3060 7zFM.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe 2560 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 1792 Windows Update.exe 1704 iexplore.exe 1704 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 1012 Windows Update.exe 1572 syncserver.exe -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 2524 Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe 804 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 1012 Windows Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1368 2984 cmd.exe 36 PID 2984 wrote to memory of 1368 2984 cmd.exe 36 PID 2984 wrote to memory of 1368 2984 cmd.exe 36 PID 2984 wrote to memory of 1368 2984 cmd.exe 36 PID 2984 wrote to memory of 1676 2984 cmd.exe 37 PID 2984 wrote to memory of 1676 2984 cmd.exe 37 PID 2984 wrote to memory of 1676 2984 cmd.exe 37 PID 2984 wrote to memory of 1488 2984 cmd.exe 38 PID 2984 wrote to memory of 1488 2984 cmd.exe 38 PID 2984 wrote to memory of 1488 2984 cmd.exe 38 PID 2984 wrote to memory of 1488 2984 cmd.exe 38 PID 2984 wrote to memory of 1128 2984 cmd.exe 39 PID 2984 wrote to memory of 1128 2984 cmd.exe 39 PID 2984 wrote to memory of 1128 2984 cmd.exe 39 PID 2984 wrote to memory of 1128 2984 cmd.exe 39 PID 2984 wrote to memory of 1380 2984 cmd.exe 40 PID 2984 wrote to memory of 1380 2984 cmd.exe 40 PID 2984 wrote to memory of 1380 2984 cmd.exe 40 PID 2984 wrote to memory of 1380 2984 cmd.exe 40 PID 2984 wrote to memory of 1252 2984 cmd.exe 41 PID 2984 wrote to memory of 1252 2984 cmd.exe 41 PID 2984 wrote to memory of 1252 2984 cmd.exe 41 PID 2984 wrote to memory of 1252 2984 cmd.exe 41 PID 2984 wrote to memory of 2856 2984 cmd.exe 42 PID 2984 wrote to memory of 2856 2984 cmd.exe 42 PID 2984 wrote to memory of 2856 2984 cmd.exe 42 PID 2984 wrote to memory of 2856 2984 cmd.exe 42 PID 2984 wrote to memory of 2604 2984 cmd.exe 43 PID 2984 wrote to memory of 2604 2984 cmd.exe 43 PID 2984 wrote to memory of 2604 2984 cmd.exe 43 PID 2984 wrote to memory of 2604 2984 cmd.exe 43 PID 2984 wrote to memory of 2440 2984 cmd.exe 44 PID 2984 wrote to memory of 2440 2984 cmd.exe 44 PID 2984 wrote to memory of 2440 2984 cmd.exe 44 PID 2984 wrote to memory of 2440 2984 cmd.exe 44 PID 2984 wrote to memory of 1712 2984 cmd.exe 45 PID 2984 wrote to memory of 1712 2984 cmd.exe 45 PID 2984 wrote to memory of 1712 2984 cmd.exe 45 PID 2984 wrote to memory of 1712 2984 cmd.exe 45 PID 2984 wrote to memory of 664 2984 cmd.exe 46 PID 2984 wrote to memory of 664 2984 cmd.exe 46 PID 2984 wrote to memory of 664 2984 cmd.exe 46 PID 2984 wrote to memory of 664 2984 cmd.exe 46 PID 2984 wrote to memory of 1612 2984 cmd.exe 47 PID 2984 wrote to memory of 1612 2984 cmd.exe 47 PID 2984 wrote to memory of 1612 2984 cmd.exe 47 PID 2984 wrote to memory of 1612 2984 cmd.exe 47 PID 2984 wrote to memory of 2524 2984 cmd.exe 48 PID 2984 wrote to memory of 2524 2984 cmd.exe 48 PID 2984 wrote to memory of 2524 2984 cmd.exe 48 PID 2984 wrote to memory of 2524 2984 cmd.exe 48 PID 1676 wrote to memory of 2472 1676 HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe 49 PID 1676 wrote to memory of 2472 1676 HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe 49 PID 1676 wrote to memory of 2472 1676 HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe 49 PID 2604 wrote to memory of 804 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 52 PID 2604 wrote to memory of 804 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 52 PID 2604 wrote to memory of 804 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 52 PID 2604 wrote to memory of 804 2604 Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe 52 PID 2440 wrote to memory of 1852 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 54 PID 2440 wrote to memory of 1852 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 54 PID 2440 wrote to memory of 1852 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 54 PID 2440 wrote to memory of 1852 2440 Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe 54 PID 1368 wrote to memory of 2184 1368 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe 59 PID 1368 wrote to memory of 2184 1368 HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe 59 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 syncserver.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 syncserver.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00346.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3060
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2560
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exeHEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe" "C:\Users\Admin\Downloads\syncserver.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\Downloads\syncserver.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Users\Admin\Downloads\syncserver.exe"C:\Users\Admin\Downloads\syncserver.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Users\Admin\Downloads\syncserver.exe"C:\Users\Admin\Downloads\syncserver.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1572
-
-
-
-
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exeHEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe3⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
PID:2472
-
-
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exeHEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-93258bd4b3ff675544ab3d79ecd6bd12c1beca4f0e391e18d03889128c7b7a9d.exeHEUR-Trojan-Ransom.Win32.GandCrypt.gen-93258bd4b3ff675544ab3d79ecd6bd12c1beca4f0e391e18d03889128c7b7a9d.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1128
-
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.Generic-4ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a.exeHEUR-Trojan-Ransom.Win32.Generic-4ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exeHEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe2⤵
- Modifies WinLogon for persistence
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Blocker.ldlo-b49b9a4bcfc90200223c824e09bf9b27b5de055da0c32932214f7d11632b1804.exeTrojan-Ransom.Win32.Blocker.ldlo-b49b9a4bcfc90200223c824e09bf9b27b5de055da0c32932214f7d11632b1804.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2856
-
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exeTrojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exerojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:804 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Roaming\Windows Update.exeC:\Users\Admin\AppData\Roaming\Windows Update.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1012 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"6⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"6⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
-
-
-
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exeTrojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe2⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exeTrojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1712 -
C:\Users\Admin\AppData\Roaming\014f411da4023b0b3ad528fdd7fa014a\jucheck.exeC:\Users\Admin\AppData\Roaming\014f411da4023b0b3ad528fdd7fa014a\jucheck.exe 3ba74b916e40329c3b4b5addc75b250006a61046ceb85c08e65e8a8425fd6e486879f3ad344c38f5da3c6d1ac1266c92a2b3b8547df92cc1f246600ed1d0b77f85ab45731ba638113b6af17a56473e55bdaf6084dde40cb20daf82a2a9a84790a0c7ac2eae508a2a69d3f18e80b027a89a65847ad26d4e952b884738d9ad1f0d57473⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exeTrojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:664
-
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exeTrojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
PID:1612 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys40D7.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:156
-
-
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exeTrojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2524
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SQAEVMXZ-DECRYPT.txt1⤵PID:2640
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:2428
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1244
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00346.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Indicator Removal
2File Deletion
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
6Credentials In Files
5Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ab6b62dae9d3087a2e1d96727874e97b
SHA12e1acb399dfa309b1c94a74bb2c779c2d0c3778e
SHA256b5adfe01237b808c1e68aa196c2aec9f77c9211fcf15be59cf6d67bc1af58a0e
SHA512ae507cc5a2921510ffeb152e6e2e91ddf53d2c06c5014326641e1b4b611e4812090ea26c5fb22e548a70c87d92e9676f91edbbd8f0deb4deee912df662355773
-
Filesize
1.2MB
MD5b37f537c07ffb61acf595d34bc6f52a7
SHA1e6290923ce7878fed8bb119b676901fcb9442ee8
SHA256894425d2a75b5bf688d74aefb7e09189a9375776fcf19d8d3216c72477009d1d
SHA512fa38ab4676b172cd9909b40a55e23f8adb513d0f86172ff55c6ab4843e8505fdde51cdfe6fec0fae5212649fdb2fd138725a557722efddcb402c7dcc9eaaa812
-
Filesize
1.2MB
MD54568be6e2a29c991d2a65ba5bac07258
SHA1a4f43adc6e99ebf1d30667ca912264e4bf0b8f15
SHA256bf5ec7eafee4f5b3594e43c740cf2d90d63f2e48a62b74af5bfce9c71df42ca6
SHA5129eaf19aefcd75ee45f317d745e67a846a47b5e594ff6bc804c62332e5aadb61bc58517ba96350f04c7fc7c2184a15a4f59974c02e5d77f7e9b80fe5293a9c678
-
Filesize
1.2MB
MD59833c5cecebcb5ee86ab09aae83f3219
SHA1eb6bdb3ec8d51b3bd26bab2d848bd75391dc28d0
SHA256a0434468d3a65fc64b9a4ede0fa2ed94d32499efb18dca8e9ac9f794879b2ee7
SHA512497a20fc3b02ab91dbd3bb271a67e76d59d89a6f77b374b10d0e30d4bc02ea4c60612f8e70b4c2e370ceb6698bb1ae7f04e829ab60e5336bcded044920ef9ab7
-
Filesize
1.2MB
MD50420d608cc8ee8ee5f35df3767d53889
SHA159d15e6f8eaca6b09ab0519c3971f216703c69d0
SHA256fb53d03c899cd57d333cbad7b173969df96017e5a969c88a2e4416584a4f186c
SHA5120191ccc052a85beca754fdd185352fade71378731c7a4741eb8d311ffdd63691e30b78bcd2affec2625298bb067894a2c38c1ffc051930a1107d695a0bcafdb7
-
Filesize
1.2MB
MD54dae4a5c177ea63fcfb67dba42454c57
SHA14d545d4a0955fb96a4446fa1b3516cef8cffbc78
SHA2561c5d484e23f073463299e2da8f34783413e733f0e40c335b886227c116156876
SHA51249ab9b22b5f0bca6fcf95f8862c49ef954fdb204420659a06c5c4a5d6a8fe26268a9816316b132d5dfe889adbf824e3073ec25b038207b7ea2def221c83ec97f
-
Filesize
1.2MB
MD58ee96586fd86c4ef563209722dc5139f
SHA12f97bf0df377d0d524b09dbaaecb7ba3a8cfd227
SHA256581d88fd442bed4ab8b43e1296b8f259947f383d6f39010f0b95572b6f0fe4b1
SHA5129561877d73985fc91d7cd9ae1cffc8ff12652c167a9be90addc8a54b7542c3cd7d2213c5616f458e217fba585a11ec6c99b22edc3d6df5136fe21687f7c1ee6c
-
Filesize
1.2MB
MD58d2deaa202e5497894c12eadc1dee395
SHA1c271e97814a19dd36916e433d56d48c5b56fd3d8
SHA256a7ce22f258cd2d7b7e1c816f2e75f583da979a30381f984faac2a34203a9d4d2
SHA5124724500883713ab2545963284e211823e3485f4dccb894cd8d6ee2d49d5fceb29e6ab96847554358acaef07a89523916d6f1b239d6236460d96357430644d3ca
-
Filesize
1.2MB
MD500a406661a76cf074da91eaf360565f5
SHA1fab8686a391f63a650fdccf807af867e069be2f9
SHA2566a5f825076182021a5289635988a82691e7685c329dd117bf941c11920451a07
SHA5120dc67d6ede3ce11eb3025b4ad2f9b5919dbdf654ef89dab52157ec2d623e6d7de47268c43c03ccbb0b2bd09429e85bfc950fcd8d7c4804b166380034d6928481
-
Filesize
1.2MB
MD56c7d1b3ecdcb2dcb7a2667690dcd37eb
SHA181705a3c567b04e0ffce0fb3cce92d054677c9d0
SHA25612ccbcd41308a9896b49ac4cbf68cf4d54aa3a02c95ecd71b8b0de9ac53d28e1
SHA5124a9788396375690f62cca741d67c825a60a88d827ab7ab94038a598493e47e0e44e3f1194993bd9bf4e0d008695ffc66c4e9dbf10e96b2df0a2dbe2847930161
-
Filesize
1.2MB
MD50d1aedb30a7a3bbf85d70f95a42ce310
SHA1bb823db9dba69ded5ad73e8f45efd8e49a3eafc7
SHA25644fef6ee8e48a4175b275f64752afed71ceab8d61827f73e4a37b0b3ee085da3
SHA5128d7573bf0c698fc0483fda8d8ec97fbfc854fc127481824c4eeed243fb39af9a9e6dec08e5e2e210336599436576aba2e8f7d71da53ff86bd85ec547e3cc90a7
-
Filesize
1.2MB
MD56459fe86dfaabaa2439ae894d2aa71aa
SHA1d2e0f812fa3182d1a81b8852249d0b533173be48
SHA25620e3ff277c2243cdbe68bb11a08225ce3ef2736dfe7de3cf4ad0dcad9e5ed4de
SHA512bb0e08f7988aec5a47d68f704148f2f2f70d9bbaba36fb3abe58ba367519b644ba9080a6a8b60771851b1c1ad5a0c77401d64852e8e3d891c344640e0fb2c499
-
Filesize
1.2MB
MD52236198281068333007018cb0cc3c1cf
SHA14142bca8b12c80a7c305f3ce26a2a14b1a09b71d
SHA256c5bd5c4394565b4eff3b2b1744b5262ac1c6fe42e28e857121b3ef4b80825411
SHA51221c9c50a3d5d0ab535e0500bd7687d61bbf2f8dc47c200ba8cb753fe89ae0b81b7b8f1103ab5217e3968f9a92fd918c4fc76791af80039791cd3dd2a238557f5
-
Filesize
1.2MB
MD5dbe71334232588e1b2f14ec3e5342d3d
SHA1924ab18109ed0ae46d96ae3d693d5679c028ed2b
SHA25663324bc6d583c6dea22e714b8ad09dd1f7bbb18e9cf6e118c28643008a5babed
SHA512d7ebfd0c25228006ddc674f9cc776d3cdf5f7a1497825fbad77de3176fada1ecbd126d5d9d1a133f6c9dede7d7628ace04ce0507547811d1ec824792c069892a
-
Filesize
1.2MB
MD52c3bddf69eea02c2606ecfeb122b7b06
SHA16aa5b92a69aedce8d676b5907701d7a2f2a5fa8a
SHA2568aa244a9a63c272474067f6e12e82a185ad90525a04064535da07162062d3fc8
SHA512ff3a94cbebd4041cc112c00ce2377f94f6dff4d5043cecc58373e2611fa7c10e100f3dcc5d3db994c61cc64c82c29f54a3571f90bbf52bdb8741b94335d6a1e4
-
Filesize
1.2MB
MD51de6434b2ae16e7d05f00636a88b89d3
SHA1226ea21a00639c2d508cbaf10d9831bf1d06f7fb
SHA2562a821096c7e9df159ce8ad81b05b50e03a7ef4984756e5912f9db91a5d2ff101
SHA5120bd5763036bab6711e17f8e780b5f9afb48c5cca0123d6aba9a088b07cefe7e3110b059bbf4588d93065fc01ad5c991ade325ca7275d4c3c9fa812ea5362bd58
-
Filesize
1.2MB
MD5f012cf15cd6427f145c7751fa47253bf
SHA167b88371e249a2cc816535de2a19c1674b4290fa
SHA2569fff26a0fbd6bd77810512efc00fc42d8a495fb87d3d197936a2bd8c66bb0b00
SHA512561b1d211b52f1ad353621c2f78cc768668956f512e4e62c50cb927268da7bc8babfe47fc034ff893ef7df8f8ab3c29901bcfbb480e359486e3dbd8e6515cd84
-
Filesize
160B
MD5000e8c41d4a15fb34d0be0dbb56e3778
SHA100c4eae64ee6239d7c65d819c6ce1ac329224f8c
SHA2568bdfa6a5b7de345cf0d4fe0e9c17d8b0e9db26d58b05b1b2ebbb3a05a068ff28
SHA512775d832eb8ab73e4a93789917dca69edb6c91fbb426e02acf7c6e213ffb4575776187209d1c471fbf57c4621ea3c23d9850f6dfc2770d62c17de9d66710800af
-
Filesize
8KB
MD5fff1e5c46b63c63a995e3ebce83a7f9d
SHA149ba6edd6c44f35b111b8afa23c0d3e9e06dec05
SHA2562b6bdea97faf89460895d382ce2157c8e7c72a277729048485a9cf6732b07289
SHA512d94781cf7d42c581fb8826da69e0163435a132479454fceba207fc6a5aab118e3e6bfda755a431d54103718355e4f5ab279cd5a5d2727cb2f6795dae280d9d5b
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51a29a38b422edb8d2d6c809bf393e522
SHA1244a958fa669edb77086c1a9a3abae2dd8183479
SHA256f288960c51b3f16ec9ae2ebf3708342a50c4f4ca3650bf4df2839748a878b89f
SHA512e9609033f888aae96c80aacbcd13622d224847d92daaed30bd912d819109923aef2ce8bc220da912f2d9809ff927f8c410cad049d67c87402458cf50bd5522f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c8f16302243e2ef0180acbe2c8a54d
SHA139b06640a0c13aeae672b857fa028d311ae83115
SHA256506aa32cf943ac33ff06b5686196a87cb245e1105438a7bf6101bff11d144d00
SHA51295b1611d0f8e1261b27b3041c71f204bf0b741ed9f8bb09a8640b03a7751b3b01ce143988cc12759abf964c00d1ba0799d81a2c6a85989c9b5967c19c7e14d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017457dde67af384c1a34585cfaa46db
SHA1000adb16b140289a3d55d40e8f3924e97de8f76b
SHA256a9a42329df98ab703d5b70ef753afd42832ab0b1042058468a76adc54e7ed592
SHA5123fa1b6b225e54a0fa48a4accc54c283afbdd5c3be434f464e057b16a98ca6392145046fbe5bb53018ea56af7c2a06cb9c070a743ed031778bab4bcc3c5761b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56716d77d5198fe909440ad2777e9aade
SHA1177610fd65cb4a0d9b2187c920fec2026eaf8127
SHA256521bfd3b37fb7804c33c1a7588827c8bef5cbfe78fb9de929d3cf838d07b0de2
SHA51288a06637c246c9dcb69930d4b4c647eb15aa672f4441e72e14430d3f494f2a11ca221b7f953160da947cd68c3d3db0fbe9e7aa11b335d440e2555899f2fd063d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0dd2c9b04e12da90e3ee5b76f89ea4
SHA12379dd1d8e989321d21053167c1d8dafcabe27dc
SHA25638e7d61882c3e34f3ebf85fa679a2b79e6ff6c824406a5cd9211ea92c2fc0f95
SHA51259065eba2fd7afc1401f4317621721475aa51580da157fb2e7d82c556936d36d26574fd46438a865a76c06b8a2fc86842054aeedb5057140c992d40921099e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81bb632a124e41f1de7b1758d879c82
SHA18454af5c646f4b2225b860d4fb66de6d59660e85
SHA2562eae30f34cc5c108e76a085ff05370400738b9a54d8896aa948ba19b0c495e86
SHA512424fadc09c3d5a0b2792abd53748a1d804966ea412a6400abe23974e1bdab65c292afc6af5016c20b3636303bc9bf42f4180260241527f5e58102e3a63b15a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de200c305eef4005092c8fcce39eadbf
SHA1db4578158096b78533889677c09b8b056d46db32
SHA2567a39574aaad59770c84ce48aaa4d3c8d443766332cb9dfe9c739667688c2899e
SHA5121e548da4cddcc6fbb7392b5a2fedb742f9483ab7e499f4ffef593497a2eaa98bca4b0d9f95ea724dd51d5a26269e18680126cf19fdf15fbd7cb1a04880a7fc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6146bc3fb905931287d04799f3acda
SHA1c9baae08f5840949049ef778c6064430ae8694e9
SHA256ad9e87ac926290b86e3bace8ba4a257f0398801689ae0ae945012339ef8e2688
SHA512c3a85722b2713613fc551e2b013d0a24ec5747ec025d320409af9c1eb649bbeae4c66f7dd7064cc830a52a1afbff63776da84fabb9ec1af6c3a393144422996f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd5bb0f770130559912e495454a269e6
SHA197a08e56da8bb64810d6c77578e515853f77df64
SHA256e3438a7390163f63e102e11948bfa35f69b467a2af982ecd3f0f6a4ee1a061c6
SHA51274774fc7e71520b5a776b14c00f007906ed33ab13c01d30e9635f4253f66fa901e56840c14b0323e49ee4453c7369a2ac7f42ff534cd87aa2d9825a9e608dd79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5894a87846ee6c2f5c4406a628458c91b
SHA17edcdc54e305bf5560d374d1f08163df83ddec4e
SHA256a20d35d7e0e9d4f1c3fd068e5184838280a0dc912380f8db2b0ea68a29e7148b
SHA5127cc2e21a7efc9ac2e2fd99f1e21c6f137bfa88d1aedf60cc4d4327aa042f043226612617617a34c01929c7d4008a5d175f1e17713c082c6c671997d6c9dac28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792127cc26ba1c4018e890781ada3a03
SHA1ffc8bf935a7e05e0a5af0538a3ceb9a3318a8f0b
SHA256e25990ffaebac7c722ab47d284952a21151b93a1510f03ba8ad6da83fc56a0e5
SHA51210363567729f6c5c8e1902bbe2a191376a58493cef33efc17d68bf3d46b47d79a6eba26866b7fd2114cd644a734a1cb160bb808e20841a02bf042c3d53e0e681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f847c39f3d12ccf55b5c6911ec8f0d3
SHA1e22cd71b9cc8189c2fce935c72a34661db9efc48
SHA25666088305355cd8ac03f286ece2fd401f80386a3fa64bea0390f78f9893053b6f
SHA512e67513c7a0b50500a8fb034b204982053eb1ea2a8ddf0db229d7a2baba4d26aa4b2d727a4795f721fec4b3d9d8e7c92d4f9d70837392f0bffb4ef2579b76fca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f223f6d6ed6f19420f7a05068eabf1
SHA1c363e7c55794c739ac76244baea53990d4d2cb36
SHA256ca7fabfe010cfe05cccdde637cb6b993129a3f23ae43297de5899259e8766771
SHA512b5f41a6061084cd175557184e9200fc0a71f9e05d0b3f68d1743000a895685fc7a40216da0257fecccb3c1098e289fbc52fa244c3573db1e8e480079d1c63d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515704fd9daa0a7ca37868af4246514d5
SHA1b20d197d7a1b8a21816e80faba3684551a2ea2ad
SHA25674cf4af313bfed74b5712b33b716334c284814fc0d549daa95305b93fccab366
SHA51214a428b59c53959e7dc1e5ac5c445974e503b7229ec1eff363ccc412190ab11fa9814bdd767f3a65fde704a5e3c76cc663d3224bc98126c9cb4401b62c8a87cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e751d3f8316551ab6281a68242ce42
SHA1eb4eefa11864f19a4dce03d52fea8020e55a1eab
SHA25632ecd5dfa9be703877ecfe8d60e0bb7ab9a1a47f06a684601b93b6112e190197
SHA5122429fabd7b600ec95795298047bb4337fe280ba9a229cd8d2c5981b8be57259dfba3b49cb7210e272c9ea47e2e59fe416d697475a053bc75076b9f93ace63123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217f5bfa446a0159c15abc07e4ad11d5
SHA1526e8cf54db2c323c3f1686d45d4de8e99e969b2
SHA256d7b98fec1729bc91e3a0e6dd83d9e3970ec2a01ac39fb841d6adc5fbe1471d49
SHA5120ccc6fcde672ab1e74d1dacaebb6c7c1b4a23c35565883b312b22d09cdc71ebaa1d04b2a38eedbb8d2dc5f5dd939797dfaddd2a0af57b38e44b8867aefe8ec1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530446215088d9ed38e9fdb84d8b14b53
SHA10f1aa3987a9a66592a14c3680c1fa64de2cb539d
SHA256cfb8364bea7c487965e18b00615029a3938cf495102dfb2abe14f4f675361014
SHA512426c83fbe15d5ebb85457fb3a89a22c3268fb5658d8a0ff69c4cc20bdd93c3608f06943d53dc492d41027cd2ee5bd0dc6bf777f82ffd01db997fdd445792a780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ab7f6b7de6f9428a42898dd12495a8
SHA1d0ba6abef47ce31525b0ab39e864c0e0422db015
SHA256ee16d874273c82d3d1e683fccafa1a4c54690177456bf4183304515fcdb0725c
SHA51247c74f436f25b2a26a3558682f174f9cb70232581f191dbe6b6e2f14b818f5bbc41421b553d37f7ca871c730876370e9f42731eea2a3d34bf24fc59c99e38ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e3fe0c91743566b89ab9d7da9b27d6
SHA1ab2d708185310129cf0dcf0caf59d99fd4032f62
SHA2565e4ae9972784452bf688fe99b0e7bf95f6f7752743ad8d5e5c6c2de1c76c6163
SHA5121bc578e6687a391b905936c14e37bcbedd9a88ca10884581a73d56eadaa60041a8755c2c9bc11c8f95e3d3cf5f37435080272afd8f5ba7ee9652da9958e0e4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506132778d4f85237e38c2a1ab4104986
SHA1d6e3bafe2d479af2584f137b42d37326c8d6011c
SHA256d8f490db56f55d4dacd8f8718f8089e7e17bd6752bfd9fe56026bfcbed6e120e
SHA51253018767eddfec8458fe4b28417ccfe29c0924c9004aaac36a50d1444772d829579e2d99e333bc85116b4a9e558a19d9c8748e9313f5902c212d2b127d1eb0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567cc2cb57d7e357daa30158c342cce50
SHA19d6b4a3935b76d0965425c3e62ff15e93e581289
SHA256dddfbdf90f4eb1fc5f0ba2007961881e8c3c4e3f6516fd1715bd00ed45ed255d
SHA512319beedc6bf3a4b59a3fc23d55bc0e05422cb09bca91194a22b3beb48462454cd070038e37cea6534225feace0b42d4dde777c1056fc96b4756c2bce1ad562b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56d917b32875d7d6e7a9690f87193070e
SHA106439dbe85a8bf04e03150e0b4e6d0f216bb3fc1
SHA256897f517f71ea512df6fceb0d90e2a884b95e086eef02dae61992336cb9723d60
SHA512e16418bd667c7ef4616a2285f137143d091f2f2575781916ebae92d76bcdd9e7f9daa86ce29df9b8bb2dcd6bb1987ba82881cb78c7c7d63bab630139b182b049
-
Filesize
16B
MD5cfdae8214d34112dbee6587664059558
SHA1f649f45d08c46572a9a50476478ddaef7e964353
SHA25633088cb514406f31e3d96a92c03294121ee9f24e176f7062625c2b36bee7a325
SHA512c260f2c223ecbf233051ac1d6a1548ad188a2777085e9d43b02da41b291ff258e4c506f99636150847aa24918c7bbb703652fef2fe55b3f50f85b5bd8dd5f6e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD524fd592890faf88e38137c08493f7ba1
SHA153529883b3ce3e054311e310111376dacc2436d0
SHA256e4460e7c7e6841380d5fce8ca86705a7ff7fccde911f646535c1fd95ce80cfc5
SHA512a182427bc17bca2212b6a022028e7b3340f485697943cf196dc6549c07efa65d1041df24c113e0d631b87fc8c7166de3af83775887fa6c47d4c02722d88dd869
-
Filesize
1KB
MD59162e8adfd9648aca1fafce0475ce68e
SHA1722aba4ba0276d19bd77d48214ca5371dc990f3d
SHA2560346f299ab909bdb8630ec751780dfcbf8df70b524a87c37aa591b8199e803cc
SHA51210f7040e29f566b0b31355bbfbdf98bb39e00ccc570ef9a43ff6e30bda4fcf4fb5675a7f2eeafc0124cf2ec8e68fec3acf59a036a7c873d4c629b4f48545c423
-
Filesize
1KB
MD5c823b083af6c002e948ef9d82fb26632
SHA123283cbbc71571c84a5e8cee659a1851cca08cbb
SHA2563bde30db17d9e21ec422c4bc9c0172235f9eab7e2a9d38d5cd58875fa9cee85f
SHA512e6c939f6bf31e8760730c1c7c12a2c8fa6632a7585fdfde00578d3c5ac766445593b70d4e3d267c7899832355716b9e3ea2d9caba1f3538cea617fae0185cf77
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.MSIL.Crypmod.gen-fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0.exe
Filesize1012KB
MD511a218065f8a3fdc547ec25b79e56177
SHA131dcbef73197d04a99bf1358e09c6c809ab4c298
SHA256fa4e1cb3e41e49004906adc5e9a22c484d18439fd84611d72f5c4fcac445f1c0
SHA5126ef2ed805a138c84b3d51c7f79f7c8d867c4813ddd6e2a799f8644cd786a24cef045b4220de28ab8474386e4ca38434a084dafc8be27425e1abb2fbe107f78de
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.MSIL.Gen.gen-52fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def.exe
Filesize60KB
MD5a4bb3a5cb6835c089d769100d5461662
SHA11b9859cc946da91a0414894cf80d123bbecdb231
SHA25652fb5d2e5555c38c4d0dd1bec893423761ed56ef1edcd3fddffd58cd507d7def
SHA51261e91d0acc6862654d0d7ea4f1275bfa3a00027615c6551eaf11c448bf9eab83525ddf0e3c3e4987a3f10ea23447e2766f4dcb68294058593238ec65939765f5
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.Crusis.gen-8f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27.exe
Filesize4.3MB
MD570c00b229ef625c6823fb7e499350b65
SHA1adcde6250040d3d713f770c2c9fd39c767cfc71d
SHA2568f26f91d2e4adb37d9c20e4bb09c8a896a15339e6021d289f4785696cc0c6e27
SHA512c6bbbbfee20e00ae048edad5187a34088079b9acf7c694ecf3f3ebba8eea93be44409ad9879e2f07c7b8b49c818d9c828bc29a419101fb8ebda01e91072e46a3
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-93258bd4b3ff675544ab3d79ecd6bd12c1beca4f0e391e18d03889128c7b7a9d.exe
Filesize220KB
MD5ed9d937ce471f3a3bb3e3062928be067
SHA1135e613ad1a7ca3609e2fc2557a3b2b3d8249e4d
SHA25693258bd4b3ff675544ab3d79ecd6bd12c1beca4f0e391e18d03889128c7b7a9d
SHA5121fdff227a43a35625bf7103611b8079326561f87d4691d7fbed1711cb9979171b14e017d5d7c42f45b237219b6af58014fc64bbd03a62ff4067ce56373a9b19c
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.Generic-4ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a.exe
Filesize805KB
MD50bb275161909d13e4523ea8904a5f74e
SHA1be6069f6a2d90ffe5b942216c22c62dd15cd70a7
SHA2564ba1d31cfb6702102989e75875b25aa3ff4797ebc51e4af6e5b919211b34d79a
SHA512d6bed9ffdd013d8336bfd467f8fece47ab19d2c783b2a46efdf926a206768f9e50592307058a42c62ee895aecb706fbc5364b728162d4d75e0dbc30dba2d0df7
-
C:\Users\Admin\Desktop\00346\HEUR-Trojan-Ransom.Win32.PolyRansom.gen-2479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d.exe
Filesize1.2MB
MD51be46c5fa0adc1e5877ee1653a86c99a
SHA18c9c60f258b794fe5fa3a14f464f7ef300ba53ce
SHA2562479a66e032a41060c43bf7c08d05f48d8cffb3231b6e183a1e25ccfccb06b7d
SHA512f78839a99582a705ccb15bcab9a693884f7bd20f2fa90224ed111f530b67b22c3ca581fd232d4d5dd992b1fddbaa684abfea5955a2d2d6aaca27ca054a663ead
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Blocker.ldlo-b49b9a4bcfc90200223c824e09bf9b27b5de055da0c32932214f7d11632b1804.exe
Filesize193KB
MD5ccc2fb58facdad1bb81383b4a10c3fcc
SHA15b6a28a16e9f0af64e2960cc21634b6b72f4b44d
SHA256b49b9a4bcfc90200223c824e09bf9b27b5de055da0c32932214f7d11632b1804
SHA512d8f25df923b2c5420e41470ad44b2c8f2916155ad9cb4add097cfbb13136fe274390cb702a85aa7cbfe9af3bc47afdbfb61c5b11c3fbaaa55c4c212551f54bb4
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Blocker.lkvy-8afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe.exe
Filesize841KB
MD524ed4bda7fb0c595c974cc4e317d61df
SHA18cf99b0a3ec7e2a882767f87a71e4132116ba192
SHA2568afceb94b78a3baff39e70881e640cef8e4fb7bb519d80d84e633661b518fdfe
SHA512e3fa2975fc7869537a760a7fbf9d78b006a42de6532f02b8e35602bd19603c94c3a1902eae1dde463ca6783662c8d3f478da64f759c43e17fce30c76fcde05dc
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Crypmod.aasc-03fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3.exe
Filesize525KB
MD54c6eb07f34609b1a0c88035ec120da79
SHA1fc00bead37f088ab0a89431bcabc30aa8cc6f524
SHA25603fd8db4a2bd1902142b78e1987df2be4cab4464a3741548b24a0737ed9396c3
SHA5126f6df98916aa8afc8bb545368c4a8e5658ee3b47fe9f130dcb0da4eb715b951e79c42b01beb61fed7830c765c422597d136f1c69150836592884da0e92198df5
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Foreign.oavk-9f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713.exe
Filesize486KB
MD5b5bce6777b2dc6220de6c31a84f97499
SHA1469d0e52a5e9a4132ae08cbb394e5da51bee46c8
SHA2569f7bf6787312458d7eadbe93d7b855dcbefd525247925efc522a75ef2ad72713
SHA5120f0c037f73e106c2fb70b7759bacc77b7fa6d721a3221015e354724c34ddb1b6c87aab4849a26c6a97a9b55f789acb906726b2c0941c20e8b6e9509b39dd1af8
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Foreign.obfe-b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d.exe
Filesize936KB
MD5b209a4295cf28df19312ba52fee2e6ba
SHA14dc4fbc83b29eebdcf7fed768b12cf50b0bd0e87
SHA256b40e9ac06a608e8652f3252ebbd0884bd114ca7c42d8ab2d0a258200e528e65d
SHA512808de7eb55d076b77b2fd8e2a12837565c9c46445f04d33529ae24f14946320ce279b3935fdacb0695c61b2ac94bc392e27064709680f8cd1bd9b0d5fb990f2a
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Locky.xmz-f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd.exe
Filesize372KB
MD594b0db77adf3fa8663f757bcceba3039
SHA15d9f0098afd602deac99e815e4211007cccde9ed
SHA256f38b5b1d00196f68a51aaf3d6b560e5d171b871c0fd492fade02091e247fd3cd
SHA5127b38c87fe820bdfe86bd15697f87995d6229d61c31ab1eac5ed0b29d74f618b8104c16cabc0e8147dc7c2b7bfb71b9be0a054ed70d60129a0a012d6c9a659d0c
-
C:\Users\Admin\Desktop\00346\Trojan-Ransom.Win32.Shade.pdb-94e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878.exe
Filesize1.4MB
MD5d478fd0974ab0ce6ea0fed098a15130f
SHA1825b0ff9867924a83a4a19718032c60762dc1631
SHA25694e39e9710ab725aefe4d7dffe3b93e447210e3b322666b9c8d42b3622094878
SHA5122d88853bf7cc42afe7951c7d29261d879fef5486148ed43545c12fae09edfcb7d51d5a37e4ee03a4e5c18852bc643c38b99e430c8f9c544c7fc5ce38284ba372
-
Filesize
8KB
MD56f3b4e9d75a0cb5213a986f81a112885
SHA14d04e13e620c781490e37502e0d10f8de4d7c857
SHA256349271610ffe5743f57aa5c464ba0e32acc69fdef238fa8f55f889c9a5dc3d98
SHA5125c37c774520ba9e9ee5a061582e00fb67005f0b022c4a63d348317913b33f5cb806d3a6308074d0b2d6137eaa2d621da2fa83d39723e3579450b8ae5db560bbb
-
Filesize
1.3MB
MD58367c028549d7927facb1aa3de95a2e9
SHA10221e9c68edf6645f9de3e7ca59ade2bc719e913
SHA256030b2d2283d479ba49b726755cc5c45d36a0781e71ff0daadcb66d49a246ca7d
SHA51234c435b396efb55a13f1fd6351a159cc71360c21d79efe777a15f90d37d2dc3156c434d2de40cec9cd65f7cf7754e56e57a50c7a904f517a3798940b7989128e
-
Filesize
1.2MB
MD5a75ffc3e0a5359ce96d11e16d2910638
SHA142cdc65a0f1f9ad4ebfed0e2b796bbbdef3d88b9
SHA256af273af96fc4fe2c97b183e66af4426b59ef350b4288ceb6c1e59c3c67fc7329
SHA51223957de52429ef8d225e9e81a275d49ff9c8eea3b0fcdfb5a3d6c04cb15681b0b5fe2e4531bda5d0e2886c4df14d44646ff2d1340bcd4c6ae67dc8c2b8803ad9
-
Filesize
8KB
MD58f2d2c378b8124e8d1c27afba729fff2
SHA1bbbffec23cb25df30b54440fcc1286d2e5d1ba5d
SHA2566e30a84a60dda51d0b427a571e4588e10e0f85af89dd0e052fe8bf4dad1c8307
SHA5121e90f67bbb521d835123c82391a4560adb6b587fb447701cc1c4de06492bd34ff7a23c24e3cfd96839d86c47e60db94cb5d0af0924007a36bfb6c59a6553e95b
-
Filesize
145B
MD5ca13857b2fd3895a39f09d9dde3cca97
SHA18b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0
SHA256cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae
SHA51255e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47