Analysis
-
max time kernel
233s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00300.7z
Resource
win7-20240903-en
General
-
Target
RNSM00300.7z
-
Size
14.0MB
-
MD5
86ca55c0e02afac41b98fb5bc9ceb5f8
-
SHA1
7eb1b3676dcee7b3270ee96f38641f212b3e63a9
-
SHA256
a1b6da5cf5ceff441aaf5b1b3e962d473b185d4b70e1abfefabe859d4bc1fe03
-
SHA512
b844650254638e4c58deb7740eb1febdae6062300bb704d79486f611766daa9c14f58df6769f553ccf3ce254c8d2ba9bfadfa84908d6951a316752df188b717b
-
SSDEEP
393216:u0lNP1E1B31eadiqPnfGDG4la4AvHDIubIaVSDoWyq5y:5DPKBFeeffC9a4o8uUYSoWyR
Malware Config
Extracted
C:\Users\Public\Videos\how_to_decrypt_files.html
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+hhthx.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/5E10E3F8F525605
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/5E10E3F8F525605
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/5E10E3F8F525605
http://xlowfznrg4wf7dli.ONION/5E10E3F8F525605
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nttno.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9F2A4996FD94963A
http://kkd47eh4hdjshb5t.angortra.at/9F2A4996FD94963A
http://ytrest84y5i456hghadefdsd.pontogrot.com/9F2A4996FD94963A
http://xlowfznrg4wf7dli.ONION/9F2A4996FD94963A
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\_README_1VZP_.hta
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\help_restore_files_vhfto.html
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\help_restore_files_vhfto.txt
https://zpr5huq4bgmutfnf.onion.to/1B1E68323C928D4F
http://zpr5huq4bgmutfnf.onion/1B1E68323C928D4F
http://kfor94jsnduf73masd.rdxhuikm8t1sxpdf7.com/1B1E68323C928D4F
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+oilvv.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/9F2A4996FD94963A
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/9F2A4996FD94963A
http://94375hfsjhbdfkj5wfg.aladadear.com/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.onion/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.ONION/9F2A4996FD94963A
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kyygd.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/9F2A4996FD94963A
http://b4youfred5485jgsa3453f.italazudda.com/9F2A4996FD94963A
http://5rport45vcdef345adfkksawe.bematvocal.at/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.onion/9F2A4996FD94963A
http://fwgrhsao3aoml7ej.ONION/9F2A4996FD94963A
Extracted
C:\!HELP_SOS.hta
http://'+s.bp
http://'+s.bp+s.txp+tx
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+hhs.txt
http://alcov44uvcwkrend.softpay4562.com/CC2A6E753D3433EA
http://tsbfdsv.extr6mchf.com/CC2A6E753D3433EA
http://psbc532jm8c.hsh73cu37n1.net/CC2A6E753D3433EA
https://vf4xdqg4mp3hnw5g.onion.to/CC2A6E753D3433EA
http://vf4xdqg4mp3hnw5g.onion/CC2A6E753D3433EA
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Gozi family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Locky family
-
Locky_lukitus family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Contacts a large (16205) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe -
Modifies boot configuration data using bcdedit 1 TTPs 7 IoCs
pid Process 19776 bcdedit.exe 21832 bcdedit.exe 33620 bcdedit.exe 40752 bcdedit.exe 41148 bcdedit.exe 68408 bcdedit.exe 71336 bcdedit.exe -
Renames multiple (1245) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (1334) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (5163) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x0003000000020ebc-9645.dat mimikatz -
Adds policy Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\DisplaySwitch.exe\"" Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SU60632U-NH5E-B175-1B86-J7K6RBN22VI8} 1day Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SU60632U-NH5E-B175-1B86-J7K6RBN22VI8}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\1day\"" 1day -
Looks for VMWare Tools registry key 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools uszy.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uszy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uszy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe -
Drops startup file 23 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+hhthx.html nrjwfxqsgnti.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+hhthx.txt nrjwfxqsgnti.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+nttno.png rktiqxohcnqj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+nttno.txt rktiqxohcnqj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+nttno.html rktiqxohcnqj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+hhs.txt qktsb-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+hhs.html qktsb-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+hhthx.png nrjwfxqsgnti.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kyygd.html jrmpyugxpxbq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_recover+hhs.txt qktsb-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+hhthx.txt nrjwfxqsgnti.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+hhthx.png nrjwfxqsgnti.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+hhthx.html nrjwfxqsgnti.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+nttno.html rktiqxohcnqj.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\DisplaySwitch.lnk Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kyygd.png jrmpyugxpxbq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kyygd.txt jrmpyugxpxbq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kyygd.html jrmpyugxpxbq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+nttno.png rktiqxohcnqj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_recover+hhs.html qktsb-a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kyygd.txt jrmpyugxpxbq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kyygd.png jrmpyugxpxbq.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+nttno.txt rktiqxohcnqj.exe -
Executes dropped EXE 64 IoCs
pid Process 984 HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe 784 HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe 3060 HEUR-Trojan-Ransom.Win32.Generic-761e39686f293694ebda3de5f4aca0faef72e45046093feae9cda442429e0932.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2124 HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe 2172 HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe 2136 HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe 1856 HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe 1656 HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe 712 Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe 3048 Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe 2168 Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe 2600 Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe 828 Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe 924 Trojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exe 2088 Trojan-Ransom.Win32.BadRabbit.e-630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da.exe 2504 Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe 2424 Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe 1320 Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exe 660 HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe 1820 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 1660 Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe 1044 Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe 756 Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe 1800 Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe 1812 Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe 1548 Trojan-Ransom.Win32.Locky.bil-6f1b3c48f263289c8de3ea1bf4b173feaa502db8ed84f4943f4a049071084aee.exe 2100 Trojan-Ransom.Win32.Bitman.qkb-0509dc1e220ace6698b2df8246210e750659cdc00a1926024342727d7a4d599e.exe 880 Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe 2896 Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe 268 Trojan-Ransom.Win32.Foreign.nonl-a6c25448cd8f87757636d291d26abb80a290d5c731cd681ba1e4f315ecfc269c.exe 1712 Trojan-Ransom.Win32.Locky.zmi-f8e7dde2601ebeb7e30af4c54016223f1c42298176e1f2f5c4945ca6b8b88317.exe 2096 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe 3052 Trojan-Ransom.Win32.Wanna.c-96ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395.exe 552 Trojan-Ransom.Win32.Wanna.zbu-0b824f863d1cbe4fcc403bbef23aaa27197d7998911f30845f0a75b5c7287949.exe 2472 Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe 1604 Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe 2648 VHO-Trojan-Ransom.Win32.Blocker.gen-96e77f4c1d8c933f43fe68eabf24b15c0fa5f9f6ebb8bf578bedaab97f952f5d.exe 804 svchost.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 1780 Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe 2932 Trojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exe 2628 Trojan-Ransom.Win32.Locky.dl-e9990ccae658bcecca6a7b52251ef55b3298d9f46c55e92dea0363398b7d6c41.exe 2480 Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe 2344 Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe 1984 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe 3008 HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe 1796 Trojan-Ransom.Win32.Zerber.apff-be027e4c5170dd074b2901a248d8c732751873b24a2d5a809c43a6f866553cc9.exe 1580 Trojan-Ransom.Win32.Zerber.lit-0df49f7541f1576a7fe6de6468ef3b3a5c1518de1376a1bd0165fbd8db47c517.exe 1608 Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe 2604 Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe 2196 nrjwfxqsgnti.exe 2248 uszy.exe 2768 uszy.exe 3808 Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe 3880 rktiqxohcnqj.exe 2952 Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe 296 HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe 3888 HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe 3660 HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe 3208 Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe 3468 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe 2364 1day -
Loads dropped DLL 31 IoCs
pid Process 3060 HEUR-Trojan-Ransom.Win32.Generic-761e39686f293694ebda3de5f4aca0faef72e45046093feae9cda442429e0932.exe 3060 HEUR-Trojan-Ransom.Win32.Generic-761e39686f293694ebda3de5f4aca0faef72e45046093feae9cda442429e0932.exe 784 HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe 1656 HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe 1604 Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe 3008 HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe 840 taskmgr.exe 3008 HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe 840 taskmgr.exe 712 Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe 1608 Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe 3856 WerFault.exe 3856 WerFault.exe 3856 WerFault.exe 3856 WerFault.exe 3856 WerFault.exe 3856 WerFault.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe 712 Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe 3888 HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe 1796 Trojan-Ransom.Win32.Zerber.apff-be027e4c5170dd074b2901a248d8c732751873b24a2d5a809c43a6f866553cc9.exe 2364 1day 2604 Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe 2836 Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe 2836 Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe 3856 WerFault.exe 17024 Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe 17024 Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe 24552 hvvtectumpkq.exe 60936 DisplaySwitch.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\sruuiwkmmpmv = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\nedefcjogqiw.exe\"" nedefcjogqiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\DisplaySwitch = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\DisplaySwitch.exe\"" Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\furouqpoaceo = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\xhgigkxrvniw.exe\"" xhgigkxrvniw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C7CD099F-FD8E-2395-F3B3-7CF10BE23C1A} = "C:\\Users\\Admin\\AppData\\Roaming\\Coxout\\uszy.exe" taskhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1B1E68323C928D4F = "C:\\Users\\Admin\\AppData\\Roaming\\svcqlj.exe" svcqlj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\entxeoeubhyj = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\rktiqxohcnqj.exe\"" rktiqxohcnqj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\opt321 = "C:\\Users\\Admin\\Desktop\\00300\\Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe" Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\BioCutil = "C:\\Users\\Admin\\AppData\\Roaming\\comrdemx\\appmters.exe" HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\vctkufnhvpxx = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\jrmpyugxpxbq.exe\"" jrmpyugxpxbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Acronis = "C:\\Users\\Admin\\AppData\\Roaming\\qktsb-a.exe" qktsb-a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AcroUpd = "C:\\Users\\Admin\\AppData\\Roaming\\8FwnL93i2WatSCZ7MJKJpgy7bmTR.exe" Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\cgueynk = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\nrjwfxqsgnti.exe" nrjwfxqsgnti.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\DisplaySwitch = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\DisplaySwitch.exe\"" Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\rbtengvjtxed = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\oubonwqeuail.exe\"" oubonwqeuail.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\12_23-dst = "C:\\Windows\\hvvtectumpkq.exe" hvvtectumpkq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\opt321 = "C:\\Users\\Admin\\Desktop\\00300\\Trojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exe" Trojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b = "C:\\Users\\Admin\\Desktop\\00300\\Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exe" Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\1B1E68323C928D4F = "C:\\Users\\Admin\\AppData\\Roaming\\svcqlj.exe" svcqlj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\1day" 1day Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvBackend = "C:\\Users\\Admin\\Desktop\\00300\\HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe" HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe -
Drops desktop.ini file(s) 29 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\v: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\W: explorer.exe File opened (read-only) \??\Y: explorer.exe File opened (read-only) \??\m: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\p: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\r: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\h: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\i: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\l: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\w: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\o: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\s: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\t: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\u: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\x: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\a: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\j: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\k: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\y: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\z: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\Q: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\b: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\g: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\n: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\e: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\q: Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe File opened (read-only) \??\K: explorer.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16927 api.ipify.org 16930 api.ipify.org 24753 ipinfo.io 82614 myexternalip.com 93220 ipinfo.io 93891 ipinfo.io 102709 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019282-140.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\asasin.bmp" Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\asasin.bmp" Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp495F.bmp" HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\asasin.bmp" Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Op9.bmp" explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2424 Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe 1120 taskhost.exe 1120 taskhost.exe 1120 taskhost.exe 1120 taskhost.exe 1172 Dwm.exe 1172 Dwm.exe 1172 Dwm.exe 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 2768 uszy.exe 2768 uszy.exe 2768 uszy.exe 2768 uszy.exe 2768 uszy.exe 3680 svchost.exe 3428 DllHost.exe 3428 DllHost.exe 3428 DllHost.exe 3428 DllHost.exe 1424 conhost.exe 3132 dw20.exe 1424 conhost.exe 3132 dw20.exe 1424 conhost.exe 3132 dw20.exe 1424 conhost.exe 3132 dw20.exe 3120 conhost.exe 3120 conhost.exe 3120 conhost.exe 3120 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 1980 conhost.exe 1980 conhost.exe 1980 conhost.exe 1980 conhost.exe 3112 vssadmin.exe 3112 vssadmin.exe 3112 vssadmin.exe 3112 vssadmin.exe 9348 conhost.exe 9348 conhost.exe 9348 conhost.exe 9348 conhost.exe 920 WMIC.exe 920 WMIC.exe 920 WMIC.exe 920 WMIC.exe 16832 conhost.exe 16832 conhost.exe 16832 conhost.exe 16832 conhost.exe 19852 9C20.tmp 19852 9C20.tmp 19852 9C20.tmp 19944 conhost.exe 19944 conhost.exe 19944 conhost.exe -
Suspicious use of SetThreadContext 27 IoCs
description pid Process procid_target PID 2124 set thread context of 660 2124 HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe 63 PID 2196 set thread context of 1820 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 48 PID 2136 set thread context of 3008 2136 HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe 80 PID 2504 set thread context of 2604 2504 Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe 90 PID 880 set thread context of 2212 880 Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe 91 PID 2248 set thread context of 2768 2248 uszy.exe 115 PID 2344 set thread context of 3808 2344 Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe 117 PID 1604 set thread context of 2952 1604 Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe 124 PID 784 set thread context of 296 784 HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe 125 PID 1656 set thread context of 3888 1656 HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe 126 PID 1988 set thread context of 3660 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe 128 PID 712 set thread context of 2964 712 Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe 129 PID 1608 set thread context of 3208 1608 Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe 135 PID 2168 set thread context of 2836 2168 Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe 146 PID 1044 set thread context of 8600 1044 Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe 151 PID 1660 set thread context of 8620 1660 Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe 153 PID 756 set thread context of 8608 756 Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe 152 PID 2600 set thread context of 9720 2600 Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe 155 PID 2364 set thread context of 8868 2364 1day 157 PID 9556 set thread context of 10680 9556 svcqlj.exe 165 PID 10048 set thread context of 17904 10048 qktsb-a.exe 185 PID 828 set thread context of 19348 828 Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe 199 PID 10344 set thread context of 22140 10344 nedefcjogqiw.exe 211 PID 11984 set thread context of 24552 11984 hvvtectumpkq.exe 214 PID 8724 set thread context of 22664 8724 oubonwqeuail.exe 216 PID 9220 set thread context of 24564 9220 jrmpyugxpxbq.exe 215 PID 18604 set thread context of 37312 18604 xhgigkxrvniw.exe 244 -
resource yara_rule behavioral1/memory/3808-567-0x0000000000400000-0x00000000005DF000-memory.dmp upx behavioral1/memory/3808-1007-0x0000000000400000-0x00000000005DF000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-overlay.png jrmpyugxpxbq.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png qktsb-a.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\how_recover+hhs.html qktsb-a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15073_.GIF Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_ReCoVeRy_+hhthx.html nrjwfxqsgnti.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\help_restore_files_vhfto.txt svcqlj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\LC_MESSAGES\_ReCoVeRy_+hhthx.html nrjwfxqsgnti.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert.css Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_ReCoVeRy_+hhthx.txt nrjwfxqsgnti.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_ReCoVeRy_+hhthx.txt nrjwfxqsgnti.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\clock.js rktiqxohcnqj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\drag.png rktiqxohcnqj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.dll Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\help_restore_files_vhfto.txt svcqlj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_ReCoVeRy_+hhthx.html nrjwfxqsgnti.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_corner_bottom_right.png svcqlj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\icon.png jrmpyugxpxbq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\cpu.css jrmpyugxpxbq.exe File opened for modification C:\Program Files\Common Files\System\how_recover+hhs.html qktsb-a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107742.WMF Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\settings.js nrjwfxqsgnti.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\Recovery+kyygd.png jrmpyugxpxbq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115834.GIF Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\Common Files\System\Recovery+nttno.png rktiqxohcnqj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv rktiqxohcnqj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonSubpicture.png rktiqxohcnqj.exe File opened for modification C:\Program Files\Windows NT\Accessories\ja-JP\_ReCoVeRy_+hhthx.html nrjwfxqsgnti.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Recovery+nttno.html rktiqxohcnqj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIcon.png qktsb-a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285808.WMF Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_SelectionSubpicture.png rktiqxohcnqj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\Recovery+oilvv.html hvvtectumpkq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\PABR.SAM Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\Recovery+kyygd.html jrmpyugxpxbq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\help_restore_files_vhfto.txt hvvtectumpkq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\clock.css rktiqxohcnqj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14870_.GIF Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD10890_.GIF Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\Recovery+nttno.png rktiqxohcnqj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\help_restore_files_vhfto.txt svcqlj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\highDpiImageSwap.js svcqlj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\_ReCoVeRy_+hhthx.html nrjwfxqsgnti.exe File opened for modification C:\Program Files\Windows Journal\es-ES\Recovery+kyygd.html jrmpyugxpxbq.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\Recovery+nttno.txt svcqlj.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\Recovery+nttno.html rktiqxohcnqj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv hvvtectumpkq.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\Recovery+kyygd.png jrmpyugxpxbq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\help_restore_files_vhfto.html svcqlj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\Recovery+nttno.txt rktiqxohcnqj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dialdot_lrg.png rktiqxohcnqj.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\Recovery+kyygd.html jrmpyugxpxbq.exe File opened for modification C:\Program Files\Common Files\System\msadc\_ReCoVeRy_+hhthx.txt svcqlj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_ReCoVeRy_+hhthx.png nrjwfxqsgnti.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_ReCoVeRy_+hhthx.txt nrjwfxqsgnti.exe File opened for modification C:\Program Files\Windows Defender\help_restore_files_vhfto.html svcqlj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\picturePuzzle.js qktsb-a.exe File opened for modification C:\Program Files\7-Zip\License.txt rktiqxohcnqj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\Recovery+nttno.html rktiqxohcnqj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\drag.png svcqlj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\Recovery+kyygd.html jrmpyugxpxbq.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\Recovery+kyygd.png jrmpyugxpxbq.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00941_.WMF Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\Recovery+nttno.txt rktiqxohcnqj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_ReCoVeRy_+hhthx.txt nrjwfxqsgnti.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\hvvtectumpkq.exe Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe File opened for modification C:\Windows\hvvtectumpkq.exe Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe File created C:\Windows\xhgigkxrvniw.exe Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe File created C:\Windows\nrjwfxqsgnti.exe Trojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File opened for modification C:\Windows\9C20.tmp rundll32.exe File opened for modification C:\Windows\xhgigkxrvniw.exe Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe File created C:\Windows\oubonwqeuail.exe Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe File opened for modification C:\Windows\oubonwqeuail.exe Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe File created C:\Windows\infpub.dat Trojan-Ransom.Win32.BadRabbit.e-630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da.exe File opened for modification C:\Windows\ HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe File opened for modification C:\Windows\Elsa Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe File created C:\Windows\rktiqxohcnqj.exe Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe File opened for modification C:\Windows\rktiqxohcnqj.exe Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe File opened for modification C:\Windows\jrmpyugxpxbq.exe Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\nrjwfxqsgnti.exe Trojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exe File created C:\Windows\jrmpyugxpxbq.exe Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe File created C:\Windows\nedefcjogqiw.exe Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe File opened for modification C:\Windows\nedefcjogqiw.exe Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3856 2100 WerFault.exe 58 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nedefcjogqiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.zmi-f8e7dde2601ebeb7e30af4c54016223f1c42298176e1f2f5c4945ca6b8b88317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvvtectumpkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhgigkxrvniw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcqlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrmpyugxpxbq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhgigkxrvniw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.BadRabbit.e-630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1day Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qktsb-a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oubonwqeuail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qktsb-a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oubonwqeuail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 20380 cmd.exe 37676 cmd.exe 71000 cmd.exe 70676 cmd.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0006000000017488-168.dat nsis_installer_1 behavioral1/files/0x0006000000017488-168.dat nsis_installer_2 behavioral1/files/0x00060000000173a7-167.dat nsis_installer_1 behavioral1/files/0x00060000000173a7-167.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 9 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3788 vssadmin.exe 16716 vssadmin.exe 32044 vssadmin.exe 61064 vssadmin.exe 62348 vssadmin.exe 3112 vssadmin.exe 19952 vssadmin.exe 37124 vssadmin.exe 47632 vssadmin.exe -
Kills process with taskkill 9 IoCs
pid Process 1576 taskkill.exe 2900 taskkill.exe 2372 taskkill.exe 2080 taskkill.exe 2252 taskkill.exe 2024 taskkill.exe 1624 taskkill.exe 2164 taskkill.exe 552 taskkill.exe -
Modifies Control Panel 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\\DisplaySwitch.exe\"" Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\WallpaperStyle = "0" HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\TileWallpaper = "0" HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCBA1A00-A1F3-11EF-972C-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD7399F0-A1F3-11EF-972C-F245C6AC432F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD331A90-A1F3-11EF-972C-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe -
Modifies data under HKEY_USERS 60 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\S-1-5-19 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\S-1-5-20\Software\AppDataLow\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\S-1-5-18 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0991766-2EAC-4898-A8C3-9D3A7AF19261}\82-4e-d3-0a-a0-2b Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\S-1-5-18 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\S-1-5-20 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\S-1-5-20\Software\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-4e-d3-0a-a0-2b Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-4e-d3-0a-a0-2b\WpadDecision = "0" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0991766-2EAC-4898-A8C3-9D3A7AF19261}\WpadNetworkName = "Network 3" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\msys svcqlj.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\.DEFAULT Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\.DEFAULT\Software\j8TelsAf explorer.exe Key created \REGISTRY\USER\S-1-5-20\Software\j8TelsAf explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0991766-2EAC-4898-A8C3-9D3A7AF19261}\WpadDecisionReason = "1" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-4e-d3-0a-a0-2b\WpadDecisionTime = d05b2e470036db01 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\S-1-5-19 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\.DEFAULT\Software\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0991766-2EAC-4898-A8C3-9D3A7AF19261}\WpadDecision = "0" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\j8TelsAf explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-4e-d3-0a-a0-2b\WpadDecisionReason = "1" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\S-1-5-19\Software\AppDataLow\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\.DEFAULT explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-19\Software\AppDataLow\j8TelsAf explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\S-1-5-19\Software\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0991766-2EAC-4898-A8C3-9D3A7AF19261}\WpadDecisionTime = d05b2e470036db01 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\S-1-5-20\Software\AppDataLow\j8TelsAf explorer.exe Key created \REGISTRY\USER\S-1-5-20 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\S-1-5-19\Software\j8TelsAf explorer.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0991766-2EAC-4898-A8C3-9D3A7AF19261} Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe -
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sage explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.sage\ = "sage.notice" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\FriendlyTypeName explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\FriendlyTypeName\ = "encrypted file" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\AppDataLow\j8TelsAf explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.sage explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\htafile explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htafile\DefaultIcon\ = "%WinDir%\\system32\\shell32.dll,44" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\AppDataLow\j8TelsAf Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\DefaultIcon explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htafile\DefaultIcon explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\AppDataLow Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\shell\open\command explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\shell\open explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\htafile\DefaultIcon explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sage\ = "sage.notice" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\FriendlyTypeName explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\shell\open explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\AppDataLow\j8TelsAf\FvlbQzMn = 06d812ebad6bc289c92c643c9d78dde50dc27c70ca3593d83950153589c4de4027f449fd8856af0ec74213c674d3e861846b15025a5863092a5337591176925e0100000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\DefaultIcon explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\DefaultIcon\ = "%WinDir%\\system32\\shell32.dll,47" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\FriendlyTypeName\ = "encrypted file" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\htafile\DefaultIcon\ = "%WinDir%\\system32\\shell32.dll,44" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Software\j8TelsAf explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\DefaultIcon\ = "%WinDir%\\system32\\shell32.dll,47" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sage.notice\shell\open\command explorer.exe -
Opens file in notepad (likely ransom note) 5 IoCs
pid Process 28752 NOTEPAD.EXE 43764 NOTEPAD.EXE 48212 NOTEPAD.EXE 48484 NOTEPAD.EXE 63216 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3168 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 45 IoCs
pid Process 984 HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe 784 HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 3060 HEUR-Trojan-Ransom.Win32.Generic-761e39686f293694ebda3de5f4aca0faef72e45046093feae9cda442429e0932.exe 2124 HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe 2136 HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe 2172 HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe 1656 HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe 1856 HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe 712 Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe 2088 Trojan-Ransom.Win32.BadRabbit.e-630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da.exe 3048 Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe 2168 Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe 1660 Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe 2600 Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe 1044 Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe 828 Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe 756 Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe 924 Trojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exe 2100 Trojan-Ransom.Win32.Bitman.qkb-0509dc1e220ace6698b2df8246210e750659cdc00a1926024342727d7a4d599e.exe 2504 Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe 880 Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe 2424 Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe 2896 Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe 268 Trojan-Ransom.Win32.Foreign.nonl-a6c25448cd8f87757636d291d26abb80a290d5c731cd681ba1e4f315ecfc269c.exe 1320 Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 1800 Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe 1780 Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe 1812 Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe 2932 Trojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exe 1548 Trojan-Ransom.Win32.Locky.bil-6f1b3c48f263289c8de3ea1bf4b173feaa502db8ed84f4943f4a049071084aee.exe 2628 Trojan-Ransom.Win32.Locky.dl-e9990ccae658bcecca6a7b52251ef55b3298d9f46c55e92dea0363398b7d6c41.exe 1712 Trojan-Ransom.Win32.Locky.zmi-f8e7dde2601ebeb7e30af4c54016223f1c42298176e1f2f5c4945ca6b8b88317.exe 2480 Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe 2096 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe 2344 Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe 3052 Trojan-Ransom.Win32.Wanna.c-96ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395.exe 1984 Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe 1796 Trojan-Ransom.Win32.Zerber.apff-be027e4c5170dd074b2901a248d8c732751873b24a2d5a809c43a6f866553cc9.exe 2472 Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe 1580 Trojan-Ransom.Win32.Zerber.lit-0df49f7541f1576a7fe6de6468ef3b3a5c1518de1376a1bd0165fbd8db47c517.exe 1604 Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe 1608 Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 2124 HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe 2124 HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe 2124 HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2628 Trojan-Ransom.Win32.Locky.dl-e9990ccae658bcecca6a7b52251ef55b3298d9f46c55e92dea0363398b7d6c41.exe 1216 Explorer.EXE -
Suspicious behavior: MapViewOfSection 12 IoCs
pid Process 880 Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe 2424 Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe 2424 Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe 1604 Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe 784 HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe 1656 HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe 1988 HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe 2212 explorer.exe 1608 Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe 2096 Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe 2364 1day 5900 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2480 Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3068 7zFM.exe Token: 35 3068 7zFM.exe Token: SeSecurityPrivilege 3068 7zFM.exe Token: SeDebugPrivilege 840 taskmgr.exe Token: SeDebugPrivilege 924 Trojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exe Token: SeBackupPrivilege 1856 HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe Token: SeSecurityPrivilege 1856 HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe Token: SeSecurityPrivilege 1856 HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe Token: SeSecurityPrivilege 1856 HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe Token: SeDebugPrivilege 3048 Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe Token: SeBackupPrivilege 3908 vssvc.exe Token: SeRestorePrivilege 3908 vssvc.exe Token: SeAuditPrivilege 3908 vssvc.exe Token: SeDebugPrivilege 2196 nrjwfxqsgnti.exe Token: SeShutdownPrivilege 1216 Explorer.EXE Token: SeDebugPrivilege 2164 taskkill.exe Token: SeDebugPrivilege 1624 taskkill.exe Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 2212 explorer.exe Token: SeDebugPrivilege 3880 rktiqxohcnqj.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 2372 taskkill.exe Token: SeDebugPrivilege 2024 taskkill.exe Token: SeDebugPrivilege 2080 taskkill.exe Token: SeShutdownPrivilege 296 HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe Token: SeDebugPrivilege 552 taskkill.exe Token: SeShutdownPrivilege 1216 Explorer.EXE Token: SeDebugPrivilege 1780 Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe Token: SeTakeOwnershipPrivilege 1780 Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe Token: SeBackupPrivilege 1780 Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe Token: SeRestorePrivilege 1780 Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe Token: SeDebugPrivilege 1800 Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe Token: SeTakeOwnershipPrivilege 1800 Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe Token: SeBackupPrivilege 1800 Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe Token: SeRestorePrivilege 1800 Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe Token: SeShutdownPrivilege 1216 Explorer.EXE Token: SeDebugPrivilege 2604 Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe Token: SeDebugPrivilege 2836 Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe Token: SeDebugPrivilege 8620 Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe Token: SeDebugPrivilege 9720 Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe Token: SeDebugPrivilege 984 HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe Token: SeDebugPrivilege 8600 Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe Token: SeDebugPrivilege 8608 Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe Token: SeDebugPrivilege 10680 svcqlj.exe Token: SeIncreaseQuotaPrivilege 920 WMIC.exe Token: SeSecurityPrivilege 920 WMIC.exe Token: SeTakeOwnershipPrivilege 920 WMIC.exe Token: SeLoadDriverPrivilege 920 WMIC.exe Token: SeSystemProfilePrivilege 920 WMIC.exe Token: SeSystemtimePrivilege 920 WMIC.exe Token: SeProfSingleProcessPrivilege 920 WMIC.exe Token: SeIncBasePriorityPrivilege 920 WMIC.exe Token: SeCreatePagefilePrivilege 920 WMIC.exe Token: SeBackupPrivilege 920 WMIC.exe Token: SeRestorePrivilege 920 WMIC.exe Token: SeShutdownPrivilege 920 WMIC.exe Token: SeDebugPrivilege 920 WMIC.exe Token: SeSystemEnvironmentPrivilege 920 WMIC.exe Token: SeRemoteShutdownPrivilege 920 WMIC.exe Token: SeUndockPrivilege 920 WMIC.exe Token: SeManageVolumePrivilege 920 WMIC.exe Token: 33 920 WMIC.exe Token: 34 920 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3068 7zFM.exe 3068 7zFM.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 1216 Explorer.EXE 1216 Explorer.EXE 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 840 taskmgr.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 840 taskmgr.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 840 taskmgr.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 1216 Explorer.EXE 1216 Explorer.EXE 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe 2732 Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 2600 Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe 828 Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe 1660 Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe 756 Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe 3052 Trojan-Ransom.Win32.Wanna.c-96ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395.exe 3052 Trojan-Ransom.Win32.Wanna.c-96ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395.exe 760 conhost.exe 988 conhost.exe 3120 conhost.exe 1424 conhost.exe 9220 jrmpyugxpxbq.exe 8724 oubonwqeuail.exe 11984 hvvtectumpkq.exe 1980 conhost.exe 2404 conhost.exe 9348 conhost.exe 3724 conhost.exe 18604 xhgigkxrvniw.exe 19944 conhost.exe 984 HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe 984 HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe 16832 conhost.exe 19168 iexplore.exe 19168 iexplore.exe 19848 conhost.exe 24516 DisplaySwitch.exe 39632 conhost.exe 37252 conhost.exe 34620 conhost.exe 22632 IEXPLORE.EXE 22632 IEXPLORE.EXE 3804 conhost.exe 40328 conhost.exe 19168 iexplore.exe 19168 iexplore.exe 36488 iexplore.exe 36488 iexplore.exe 40272 conhost.exe 40012 iexplore.exe 40012 iexplore.exe 41020 IEXPLORE.EXE 41020 IEXPLORE.EXE 48376 conhost.exe 49640 conhost.exe 22632 IEXPLORE.EXE 22632 IEXPLORE.EXE 60436 IEXPLORE.EXE 60436 IEXPLORE.EXE 56336 IEXPLORE.EXE 56336 IEXPLORE.EXE 63704 conhost.exe 61772 conhost.exe 62240 IEXPLORE.EXE 62240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 984 1832 cmd.exe 35 PID 1832 wrote to memory of 984 1832 cmd.exe 35 PID 1832 wrote to memory of 984 1832 cmd.exe 35 PID 1832 wrote to memory of 984 1832 cmd.exe 35 PID 1832 wrote to memory of 784 1832 cmd.exe 36 PID 1832 wrote to memory of 784 1832 cmd.exe 36 PID 1832 wrote to memory of 784 1832 cmd.exe 36 PID 1832 wrote to memory of 784 1832 cmd.exe 36 PID 1832 wrote to memory of 1988 1832 cmd.exe 37 PID 1832 wrote to memory of 1988 1832 cmd.exe 37 PID 1832 wrote to memory of 1988 1832 cmd.exe 37 PID 1832 wrote to memory of 1988 1832 cmd.exe 37 PID 1832 wrote to memory of 1988 1832 cmd.exe 37 PID 1832 wrote to memory of 1988 1832 cmd.exe 37 PID 1832 wrote to memory of 1988 1832 cmd.exe 37 PID 1832 wrote to memory of 2196 1832 cmd.exe 38 PID 1832 wrote to memory of 2196 1832 cmd.exe 38 PID 1832 wrote to memory of 2196 1832 cmd.exe 38 PID 1832 wrote to memory of 2196 1832 cmd.exe 38 PID 1832 wrote to memory of 3060 1832 cmd.exe 39 PID 1832 wrote to memory of 3060 1832 cmd.exe 39 PID 1832 wrote to memory of 3060 1832 cmd.exe 39 PID 1832 wrote to memory of 3060 1832 cmd.exe 39 PID 1832 wrote to memory of 2124 1832 cmd.exe 40 PID 1832 wrote to memory of 2124 1832 cmd.exe 40 PID 1832 wrote to memory of 2124 1832 cmd.exe 40 PID 1832 wrote to memory of 2124 1832 cmd.exe 40 PID 1832 wrote to memory of 2136 1832 cmd.exe 41 PID 1832 wrote to memory of 2136 1832 cmd.exe 41 PID 1832 wrote to memory of 2136 1832 cmd.exe 41 PID 1832 wrote to memory of 2136 1832 cmd.exe 41 PID 1832 wrote to memory of 2172 1832 cmd.exe 42 PID 1832 wrote to memory of 2172 1832 cmd.exe 42 PID 1832 wrote to memory of 2172 1832 cmd.exe 42 PID 1832 wrote to memory of 2172 1832 cmd.exe 42 PID 1832 wrote to memory of 1656 1832 cmd.exe 43 PID 1832 wrote to memory of 1656 1832 cmd.exe 43 PID 1832 wrote to memory of 1656 1832 cmd.exe 43 PID 1832 wrote to memory of 1656 1832 cmd.exe 43 PID 1832 wrote to memory of 1856 1832 cmd.exe 44 PID 1832 wrote to memory of 1856 1832 cmd.exe 44 PID 1832 wrote to memory of 1856 1832 cmd.exe 44 PID 1832 wrote to memory of 1856 1832 cmd.exe 44 PID 1832 wrote to memory of 712 1832 cmd.exe 45 PID 1832 wrote to memory of 712 1832 cmd.exe 45 PID 1832 wrote to memory of 712 1832 cmd.exe 45 PID 1832 wrote to memory of 712 1832 cmd.exe 45 PID 1832 wrote to memory of 2088 1832 cmd.exe 46 PID 1832 wrote to memory of 2088 1832 cmd.exe 46 PID 1832 wrote to memory of 2088 1832 cmd.exe 46 PID 1832 wrote to memory of 2088 1832 cmd.exe 46 PID 1832 wrote to memory of 2088 1832 cmd.exe 46 PID 1832 wrote to memory of 2088 1832 cmd.exe 46 PID 1832 wrote to memory of 2088 1832 cmd.exe 46 PID 1832 wrote to memory of 3048 1832 cmd.exe 47 PID 1832 wrote to memory of 3048 1832 cmd.exe 47 PID 1832 wrote to memory of 3048 1832 cmd.exe 47 PID 1832 wrote to memory of 3048 1832 cmd.exe 47 PID 2196 wrote to memory of 1820 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 48 PID 2196 wrote to memory of 1820 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 48 PID 2196 wrote to memory of 1820 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 48 PID 2196 wrote to memory of 1820 2196 HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe 48 PID 1832 wrote to memory of 2168 1832 cmd.exe 49 PID 1832 wrote to memory of 2168 1832 cmd.exe 49 -
System policy modification 1 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qktsb-a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nrjwfxqsgnti.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" svcqlj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" nedefcjogqiw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" xhgigkxrvniw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qktsb-a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System rktiqxohcnqj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" hvvtectumpkq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" jrmpyugxpxbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nedefcjogqiw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System oubonwqeuail.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" oubonwqeuail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hvvtectumpkq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" nrjwfxqsgnti.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" rktiqxohcnqj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svcqlj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System jrmpyugxpxbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xhgigkxrvniw.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1120 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Interacts with shadow copies
PID:3112
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1216 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00300.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3068
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exeHEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exeHEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:784 -
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exeHEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe4⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:296 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\_README_49ISYH_.hta"5⤵PID:82540
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"5⤵PID:82972
-
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exeHEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1988 -
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exeHEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3B1E\1D8F.bat" "C:\Users\Admin\AppData\Roaming\comrdemx\appmters.exe" "C:\Users\Admin\Desktop\00300\HEUR-T~3.EXE""5⤵PID:3144
-
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exeHEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exeHEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe4⤵
- Executes dropped EXE
PID:1820
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-761e39686f293694ebda3de5f4aca0faef72e45046093feae9cda442429e0932.exeHEUR-Trojan-Ransom.Win32.Generic-761e39686f293694ebda3de5f4aca0faef72e45046093feae9cda442429e0932.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
PID:804
-
-
C:\Windows\system32\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysA322.tmp"4⤵PID:1336
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exeHEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe3⤵
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exeHEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe4⤵
- Executes dropped EXE
PID:660
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exeHEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe3⤵
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2136 -
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exeHEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3008 -
C:\Users\Admin\AppData\Roaming\Coxout\uszy.exe"C:\Users\Admin\AppData\Roaming\Coxout\uszy.exe"5⤵
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2248 -
C:\Users\Admin\AppData\Roaming\Coxout\uszy.exe"C:\Users\Admin\AppData\Roaming\Coxout\uszy.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_8b54ea0f.bat"5⤵PID:2488
-
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exeHEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2172 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:40012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:40012 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
PID:48676
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys7668.tmp"4⤵PID:40880
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exeHEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1656 -
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exeHEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3888 -
C:\Users\Admin\AppData\Roaming\Install\1day-m "C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2364 -
C:\Users\Admin\AppData\Roaming\Install\1day-m "C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe"6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8868
-
-
-
-
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:71000
-
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"4⤵PID:70764
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:70676
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exeTrojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:712 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exeTrojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe4⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.BadRabbit.e-630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da.exeTrojan-Ransom.Win32.BadRabbit.e-630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2088 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 154⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:17012 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal5⤵PID:16824
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3332374932 && exit"5⤵PID:19136
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 19:33:005⤵PID:19792
-
-
C:\Windows\9C20.tmp"C:\Windows\9C20.tmp" \\.\pipe\{2BC3ABF4-0DFF-415E-AE70-1BA63D1F21B1}5⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:19852
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exeTrojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Windows\rktiqxohcnqj.exeC:\Windows\rktiqxohcnqj.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3880 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:48212
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive5⤵PID:49564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\RKTIQX~1.EXE5⤵PID:59592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TROJAN~3.EXE4⤵PID:1972
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exeTrojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2168 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exeTrojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Users\Admin\AppData\Roaming\qktsb-a.exeC:\Users\Admin\AppData\Roaming\qktsb-a.exe5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:10048 -
C:\Users\Admin\AppData\Roaming\qktsb-a.exeC:\Users\Admin\AppData\Roaming\qktsb-a.exe6⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:17904 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootems off7⤵
- Modifies boot configuration data using bcdedit
PID:19776
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} advancedoptions off7⤵
- Modifies boot configuration data using bcdedit
PID:21832
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} optionsedit off7⤵
- Modifies boot configuration data using bcdedit
PID:33620
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures7⤵
- Modifies boot configuration data using bcdedit
PID:40752
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} recoveryenabled off7⤵
- Modifies boot configuration data using bcdedit
PID:41148
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:47632
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.txt7⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:48484
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:61064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\qktsb-a.exe7⤵PID:71456
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"8⤵PID:72172
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TROJAN~4.EXE5⤵PID:10208
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exeTrojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exeTrojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8620 -
C:\Windows\jrmpyugxpxbq.exeC:\Windows\jrmpyugxpxbq.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:9220 -
C:\Windows\jrmpyugxpxbq.exeC:\Windows\jrmpyugxpxbq.exe6⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:24564 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:40308
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT7⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:63216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\JRMPYU~1.EXE7⤵PID:68560
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TR3A8A~1.EXE5⤵PID:10692
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exeTrojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exeTrojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9720 -
C:\Windows\oubonwqeuail.exeC:\Windows\oubonwqeuail.exe5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:8724 -
C:\Windows\oubonwqeuail.exeC:\Windows\oubonwqeuail.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- System policy modification
PID:22664
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TRDBEB~1.EXE5⤵PID:10620
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exeTrojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1044 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exeTrojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe4⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:8600 -
C:\Windows\nedefcjogqiw.exeC:\Windows\nedefcjogqiw.exe5⤵
- Suspicious use of SetThreadContext
PID:10344 -
C:\Windows\nedefcjogqiw.exeC:\Windows\nedefcjogqiw.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- System policy modification
PID:22140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TR83A9~1.EXE5⤵PID:9744
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exeTrojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exeTrojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe4⤵
- Drops file in Windows directory
PID:19348 -
C:\Windows\xhgigkxrvniw.exeC:\Windows\xhgigkxrvniw.exe5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:18604 -
C:\Windows\xhgigkxrvniw.exeC:\Windows\xhgigkxrvniw.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- System policy modification
PID:37312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TR6F72~1.EXE5⤵PID:19288
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exeTrojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exeTrojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe4⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:8608 -
C:\Windows\hvvtectumpkq.exeC:\Windows\hvvtectumpkq.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:11984 -
C:\Windows\hvvtectumpkq.exeC:\Windows\hvvtectumpkq.exe6⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:24552 -
C:\Users\Admin\Documents\rbten.exeC:\Users\Admin\Documents\rbten.exe7⤵PID:24424
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet8⤵
- Interacts with shadow copies
PID:32044
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TR323C~1.EXE5⤵PID:12112
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exeTrojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\nrjwfxqsgnti.exeC:\Windows\nrjwfxqsgnti.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2196 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵PID:3688
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT5⤵
- Opens file in notepad (likely ransom note)
PID:43764
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵PID:48572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\NRJWFX~1.EXE5⤵PID:50760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00300\TR685F~1.EXE4⤵PID:3952
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.qkb-0509dc1e220ace6698b2df8246210e750659cdc00a1926024342727d7a4d599e.exeTrojan-Ransom.Win32.Bitman.qkb-0509dc1e220ace6698b2df8246210e750659cdc00a1926024342727d7a4d599e.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 364⤵
- Loads dropped DLL
- Program crash
PID:3856
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exeTrojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2504 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exeC:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Users\Admin\AppData\Roaming\svcqlj.exeC:\Users\Admin\AppData\Roaming\svcqlj.exe5⤵
- Suspicious use of SetThreadContext
PID:9556 -
C:\Users\Admin\AppData\Roaming\svcqlj.exeC:\Users\Admin\AppData\Roaming\svcqlj.exe6⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:10680 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:16716
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\HELP_RESTORE_FILES.TXT7⤵
- Opens file in notepad (likely ransom note)
PID:28752
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:37124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\HELP_RESTORE_FILES.HTML7⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:36488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:36488 CREDAT:275457 /prefetch:28⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:42532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\svcqlj.exe >> NUL7⤵PID:48524
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\Desktop\00300\TR0460~1.EXE >> NUL5⤵PID:9040
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exeTrojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:880 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"4⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exeTrojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2424
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exeTrojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2896
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.nonl-a6c25448cd8f87757636d291d26abb80a290d5c731cd681ba1e4f315ecfc269c.exeTrojan-Ransom.Win32.Foreign.nonl-a6c25448cd8f87757636d291d26abb80a290d5c731cd681ba1e4f315ecfc269c.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:268
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exeTrojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1320
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exeTrojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\Documents and Settings\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\.exe4⤵PID:11396
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\how_to_decrypt_files.html.exe4⤵PID:16740
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\Aczv8rkJMB.82ac.exe4⤵PID:19480
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\asasin-aa52.htm.exe4⤵PID:3148
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\FQcwFqmw5a.82ac.exe4⤵PID:26368
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\Giwu--vK6X.82ac.exe4⤵PID:34568
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\gQQaqYw3R5.82ac.exe4⤵PID:37412
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\help_restore_files_vhfto.html.exe4⤵PID:36504
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\help_restore_files_vhfto.txt.exe4⤵PID:40876
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\HL7v8boljt.82ac.exe4⤵PID:33404
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\TYW5G47B-9AF8-S1NJ-53B9EACA-4A912FF549E9.asasin.exe4⤵PID:40016
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\TYW5G47B-9AF8-S1NJ-876D47FB-F9A96922BCC4.asasin.exe4⤵PID:47936
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\_README_K11W9Z2_.hta.exe4⤵PID:47368
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\1RsMZew62n.82ac.exe4⤵PID:48812
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\asasin-bcd6.htm.exe4⤵PID:49140
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\CP5vSnauhF.82ac.exe4⤵PID:49032
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\help_restore_files_vhfto.txt.mp3.exe4⤵PID:48456
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\IQSqRD8inG.82ac.exe4⤵PID:48832
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.exe4⤵PID:55564
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe.exe4⤵PID:59816
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\pkeyconfig-office.xrm-ms.exe4⤵PID:48152
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.exe4⤵PID:59852
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery+kyygd.html.exe4⤵PID:60988
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery+kyygd.png.exe4⤵PID:61184
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery+kyygd.txt.exe4⤵PID:61972
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery+oilvv.html.exe4⤵PID:62152
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery+oilvv.png.exe4⤵PID:62972
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery+oilvv.txt.exe4⤵PID:62800
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe.exe4⤵PID:64140
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-028BC579-C6CE9458861C.asasin.exe4⤵PID:63544
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-E4B1E2E5-A86753A21DC4.asasin.exe4⤵PID:65168
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-515F8AC5-FB4B908F5C3B.lukitus.exe4⤵PID:65200
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-925639DC-329A6BE36E7E.lukitus.exe4⤵PID:65036
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-BDC81C53-73B841301F38.lukitus.exe4⤵PID:66332
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\TYW5GUFU-9AF8-SADT-653DC077-5929F44A70C5.asasin.exe4⤵PID:65904
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\yEKKVyO0pD.82ac.exe4⤵PID:66728
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\_README_Y5V73U_.hta.exe4⤵PID:67740
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\4nB98tf3k3.82ac.exe4⤵PID:67672
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\asasin-6e06.htm.exe4⤵PID:68032
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.msi.exe4⤵PID:67420
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\help_restore_files_vhfto.txt.mp3.exe4⤵PID:72508
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+hhs.html.exe4⤵PID:70992
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+hhs.txt.exe4⤵PID:73492
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:71304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\M82RRS8XeQ.82ac.exe4⤵PID:73016
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kyygd.html.exe4⤵PID:69044
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:19708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kyygd.png.exe4⤵PID:74672
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kyygd.txt.exe4⤵PID:73692
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+oilvv.html.exe4⤵PID:74732
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+oilvv.png.exe4⤵PID:79152
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+oilvv.txt.exe4⤵PID:80424
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-4324D70D-E699B305790F.asasin.exe4⤵PID:83020
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-90894203-A0D02B0991ED.asasin.exe4⤵PID:83656
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-9BC074EF-CA52D9AE9655.lukitus.exe4⤵PID:83616
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-B220D8D7-B72BECCB7250.lukitus.exe4⤵PID:83916
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\TYW5GUFU-9AF8-SADT-508F9474-3012BC039A92.asasin.exe4⤵PID:83584
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\uhOcPddIVC.82ac.exe4⤵PID:77272
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\YiExzZPtZt.82ac.exe4⤵PID:69544
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_README_NUNQDD_.hta.exe4⤵PID:33500
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\asasin-d679.htm.exe4⤵PID:81348
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\f3QSzJS-Zg.82ac.exe4⤵PID:49148
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\lEqaA4LSS3.82ac.exe4⤵PID:83784
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.msi.exe4⤵PID:82592
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:83932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\SrsTBF0S5v.82ac.exe4⤵PID:83040
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-69A6BF47-259712265199.asasin.exe4⤵PID:83408
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-E1E6C00E-3F47244EC991.asasin.exe4⤵PID:83316
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-5666F9BC-A72F2243435B.lukitus.exe4⤵PID:81624
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-A3B6A67E-E7A75C4204C8.lukitus.exe4⤵PID:48248
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-544F5369-3AF97E5B7628.asasin.exe4⤵PID:48616
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-5A905F8C-80B84E3BC109.asasin.exe4⤵PID:83324
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:83336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-8E50887E-EE3AF540096C.asasin.exe4⤵PID:2704
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-A93EBCE2-E0FC337662BA.asasin.exe4⤵PID:83892
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:82084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-A9DDE1BB-5A4C992F749A.asasin.exe4⤵PID:40436
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-B216564F-3C342CCA277D.asasin.exe4⤵PID:83956
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-DB9C9DC9-365FC76EEAAD.asasin.exe4⤵PID:3188
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-E0915440-AFE7AFC51EF4.asasin.exe4⤵PID:83840
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-F9BE2FA0-E996134127D1.asasin.exe4⤵PID:83656
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\TYW5GUFU-9AF8-SADT-4B9E2299-3FA945143F67.asasin.exe4⤵PID:77912
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\v5ZZpdFIl3.82ac.exe4⤵PID:82824
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\_README_4VJ4X_.hta.exe4⤵PID:83556
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\asasin-41bc.htm.exe4⤵PID:61744
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:83956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\lOFGrgoK9R.82ac.exe4⤵PID:83364
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.msi.exe4⤵PID:83680
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\Ssh0poR1cm.82ac.exe4⤵PID:82844
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-88C095C1-45D11A6013D7.asasin.exe4⤵PID:61784
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5G47B-9AF8-S1NJ-9243CD6C-97CB75A88C60.asasin.exe4⤵PID:66652
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-14ECF15B-1186BBCFEA2F.lukitus.exe4⤵PID:68824
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5G70E-9AF8-S187-EAEFB106-3F1FB16B06A4.lukitus.exe4⤵PID:68632
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-05410C90-F0EE35B523BA.asasin.exe4⤵PID:11008
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-1D50B8F3-DF22B1C0BA04.asasin.exe4⤵PID:36748
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-1DA36F50-93905D4584CB.asasin.exe4⤵PID:83716
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-251F3920-2DF040F8C0A7.asasin.exe4⤵PID:59940
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:30308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-3B4F535A-AC3B9B81095F.asasin.exe4⤵PID:83456
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-62B4D703-09A797D8C95E.asasin.exe4⤵PID:74372
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-7FF744D3-60B9C13A379D.asasin.exe4⤵PID:83500
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\7zs.sfx + C:\Users\Admin\AppData\Local\Temp\config.txt + C:\Users\Admin\AppData\Local\Temp\installer.7z c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\TYW5GUFQ-9AF8-SNFS-9B19F40E-475C874F04D3.asasin.exe4⤵PID:568
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe"5⤵PID:2244
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exeTrojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\asasin.htm4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:19168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:19168 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:22632
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:19168 CREDAT:472069 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:41020
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:19168 CREDAT:5780482 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:60436
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:19168 CREDAT:5649410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:56336
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:19168 CREDAT:5518338 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:62240
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:19168 CREDAT:3552272 /prefetch:25⤵PID:72404
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys79E1.tmp"4⤵PID:40772
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exeTrojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys697D.tmp"4⤵PID:40572
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exeTrojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysCBE7.tmp"4⤵PID:48204
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exeTrojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys4B05.tmp"4⤵PID:83296
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.bil-6f1b3c48f263289c8de3ea1bf4b173feaa502db8ed84f4943f4a049071084aee.exeTrojan-Ransom.Win32.Locky.bil-6f1b3c48f263289c8de3ea1bf4b173feaa502db8ed84f4943f4a049071084aee.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1548
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.dl-e9990ccae658bcecca6a7b52251ef55b3298d9f46c55e92dea0363398b7d6c41.exeTrojan-Ransom.Win32.Locky.dl-e9990ccae658bcecca6a7b52251ef55b3298d9f46c55e92dea0363398b7d6c41.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
PID:2628
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.zmi-f8e7dde2601ebeb7e30af4c54016223f1c42298176e1f2f5c4945ca6b8b88317.exeTrojan-Ransom.Win32.Locky.zmi-f8e7dde2601ebeb7e30af4c54016223f1c42298176e1f2f5c4945ca6b8b88317.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1712
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exeTrojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: RenamesItself
PID:2480 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 7844⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 10444⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 28964⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 6604⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 2684⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 13204⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 17124⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 30524⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 19844⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exeTrojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2096 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe"C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe" g4⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "a2Bbyxpt" /TR "C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe" /SC ONLOGON /RL HIGHEST /F4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3168
-
-
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"4⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: MapViewOfSection
PID:5900 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"5⤵
- System Location Discovery: System Language Discovery
PID:11048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet5⤵PID:16704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete5⤵PID:17188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet5⤵PID:18124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet5⤵PID:17772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete5⤵PID:38828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet5⤵PID:40680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet5⤵PID:1804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete5⤵PID:41244
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet5⤵PID:42024
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta"5⤵
- System Location Discovery: System Language Discovery
PID:62340
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"5⤵
- System Location Discovery: System Language Discovery
PID:61616
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN /F "a2Bbyxpt"5⤵
- System Location Discovery: System Language Discovery
PID:60856
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1256447689.vbs"5⤵PID:65440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet5⤵PID:65172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete5⤵PID:65048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet5⤵PID:48792
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exeTrojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2344 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exeTrojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3808
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.c-96ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395.exeTrojan-Ransom.Win32.Wanna.c-96ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exeTrojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1984
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.zbu-0b824f863d1cbe4fcc403bbef23aaa27197d7998911f30845f0a75b5c7287949.exeTrojan-Ransom.Win32.Wanna.zbu-0b824f863d1cbe4fcc403bbef23aaa27197d7998911f30845f0a75b5c7287949.exe3⤵
- Executes dropped EXE
PID:552
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.apff-be027e4c5170dd074b2901a248d8c732751873b24a2d5a809c43a6f866553cc9.exeTrojan-Ransom.Win32.Zerber.apff-be027e4c5170dd074b2901a248d8c732751873b24a2d5a809c43a6f866553cc9.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1796
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exeTrojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2472 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exeTrojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe4⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
PID:17024 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:20380
-
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\DisplaySwitch.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\DisplaySwitch.exe"5⤵
- Suspicious use of SetWindowsHookEx
PID:24516 -
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\DisplaySwitch.exe"C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\DisplaySwitch.exe"6⤵
- Loads dropped DLL
PID:60936 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:62348
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete7⤵PID:59208
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no7⤵
- Modifies boot configuration data using bcdedit
PID:68408
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures7⤵
- Modifies boot configuration data using bcdedit
PID:71336
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.gnq-bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:37676
-
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.lit-0df49f7541f1576a7fe6de6468ef3b3a5c1518de1376a1bd0165fbd8db47c517.exeTrojan-Ransom.Win32.Zerber.lit-0df49f7541f1576a7fe6de6468ef3b3a5c1518de1376a1bd0165fbd8db47c517.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1580
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exeTrojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1604 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exeTrojan-Ransom.Win32.Zerber.tju-a4522dc65d5455cc384f8c9abff3a8b382f45d05854339b54e7bb84cd4d11662.exe4⤵
- Executes dropped EXE
PID:2952
-
-
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exeTrojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1608 -
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exeTrojan-Ransom.Win32.Zerber.uie-9ff1921b0e3934630adb6551b9034fa3cc7f6c1bc4b09aa4211330ba427f663d.exe4⤵
- Executes dropped EXE
PID:3208
-
-
-
C:\Users\Admin\Desktop\00300\VHO-Trojan-Ransom.Win32.Blocker.gen-96e77f4c1d8c933f43fe68eabf24b15c0fa5f9f6ebb8bf578bedaab97f952f5d.exeVHO-Trojan-Ransom.Win32.Blocker.gen-96e77f4c1d8c933f43fe68eabf24b15c0fa5f9f6ebb8bf578bedaab97f952f5d.exe3⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 5044⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3132
-
-
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵PID:82848
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:836
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-20017008491105034691-21224657361234797411469661128-161029695-4820055135897832"1⤵PID:1756
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "138648295418865237591293425216-1381115008-14878031412754431611682966700229695755"1⤵
- Suspicious use of SetWindowsHookEx
PID:988
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-141737357314165324201127829853523689929207945043220911538025123900191268913090"1⤵
- Suspicious use of SetWindowsHookEx
PID:2404
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1849023059563666038-1160446837-719678223-1180054901-473406956-156918958190147052"1⤵
- Suspicious use of SetWindowsHookEx
PID:760
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2236
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "171089643616778712931619127455-663191679549350149-681472285-1189308744461662851"1⤵PID:2128
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "57857648-1704617555-1398079375-1063138629-597541562-1696735297-346672933-1095475034"1⤵PID:2356
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "427988645155072374216390744911715484189860275254-3843233061100677256-1783424943"1⤵PID:2228
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "72043324372390917-209887598-1709627147-1999774028942480537-1557238753426179436"1⤵PID:532
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1288443420-1488044218-8671244558014107-868751982-1134499165-136440111-208178595"1⤵PID:3060
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-23067875014723564731373642816663349850-666776910-532946811275004704-1174404718"1⤵PID:1728
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-20189899784530611515906413865357705795933921521657779879-15868732481068214808"1⤵PID:1616
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1094664074-470497623360677965-658870789-1145422474-672181247390616723994245559"1⤵PID:1784
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "7344253462044712104-850207771-11898653531738114525-269177766-1204377137-1405474675"1⤵PID:2872
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1568649916-1262890878-16211642492088472240-31590330-2033969299-433658938-603883867"1⤵PID:2796
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
C:\Windows\system32\taskeng.exetaskeng.exe {611BDB41-E6F3-4406-B201-F9B7CCDC4BEA} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3672
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All2⤵
- Interacts with shadow copies
PID:3788
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /Quiet /All2⤵
- Interacts with shadow copies
PID:19952
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1377698282-378786201417765756-1326970837-66406510-458481443-1386396349-1030132358"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1424
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3428
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exeC:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3468
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-346484913-1951227661-96267343829671470652901940142865352995296141509157207"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3724
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-404124501-681192578-366570477-785769518-310712422-12997517041137289901-767473677"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2085721173-513051821389617413-1762498263929721599-17884182871768403622198887865"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1980
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "803703420-1485550942-554955392-1396395641-141286594751570105-317896671142550957"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:9348
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-11379497131736177661-263062269-132854146526344128511214528981878398114-1806040518"1⤵PID:11524
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-402764019687963750-2980204512827819371162214145-1903006975-772976023209643329"1⤵PID:12248
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1962647787752584696-1674513637753763879-551643338-1902035812-929061734-1053200571"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:16832
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "548124886-1896269510-81130648520563731317308431541866884108729528502-141776601"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:19944
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "521909822951550523-152734374913099498931160509374111566469-1808957454-696857923"1⤵PID:19976
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:19208
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-6701509961975484885-194373508715607358231660256816-18465359741481113732-1454700139"1⤵
- Suspicious use of SetWindowsHookEx
PID:19848
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:21592
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "12986282954341118299913588801879226938-1363830375-1679875825-1033133268-1388130964"1⤵
- Suspicious use of SetWindowsHookEx
PID:34620
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-991206156-843418395259658813-523030157-321426834-15382131122054830563-86418157"1⤵
- Suspicious use of SetWindowsHookEx
PID:37252
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1011329368-491583309480994245-14848247681214560851-2017049618497565761-1927332465"1⤵PID:37432
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "149132728481464997-603698701198307339-21460340661275065300-1539421280-841122614"1⤵
- Suspicious use of SetWindowsHookEx
PID:39632
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1254706842-1047765813-2544975111814205202838320784-406526887-15025550199599053"1⤵
- Suspicious use of SetWindowsHookEx
PID:40328
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "13388676232246037723490939183832586613698498901278555200513157241843054312"1⤵
- Suspicious use of SetWindowsHookEx
PID:3804
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:5580
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "405355575-202482352319877824455025451560370189947780427-485470294-511769533"1⤵
- Suspicious use of SetWindowsHookEx
PID:40272
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x46c1⤵PID:41584
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-960778184-1606804983-699906507-1963789349148343687511103585511825565975510955307"1⤵PID:48688
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2087666693580863332-1428216657-392471095-2148897591949246568-951872719-1762597828"1⤵
- Suspicious use of SetWindowsHookEx
PID:48376
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-424518414513852562-1646344-203215533886094961254497589415915816921649790484"1⤵
- Suspicious use of SetWindowsHookEx
PID:49640
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-320809241369199482297541896-1854179864-1951514770-1449889858863738670-177724830"1⤵PID:61308
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2457800549724573031673407963-4207814051966865508-12833613201089117222293786722"1⤵
- Suspicious use of SetWindowsHookEx
PID:61772
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-538996138-5576895461521517468-729223838-70073229819943120732023001712671492102"1⤵
- Suspicious use of SetWindowsHookEx
PID:63704
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:74408
-
C:\Windows\system32\taskeng.exetaskeng.exe {8ADE3B77-2FAB-4CD3-B71A-2F9A5F4AD7B9} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵PID:83632
-
C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exeC:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\eventcreate.exe2⤵PID:61136
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
1Query Registry
4System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5287a71cb3ab6b4a1a6c92965a28523df
SHA1dc0170b7fa81bd99a895e98224f62114ff5ae9ec
SHA2566be6c1317bc3b335366645a75ccd7974f93d48a19ed20f9beb808f1a69ef2e22
SHA512dd9adcb5086072da3cb2b703891dde5f7b48a515ca4516542455946d548c9e383e5479e35cb20f4233c4463221b92956930dfcbdcb43ab7f969266587eaee1a9
-
Filesize
2KB
MD527fe78e575970247cee8120e4adbe549
SHA12ebce3daee671e7f98e6bac04e810a4c6eaa3ea0
SHA2566a961b4e82ad5e9f1f43bc63e8b7487d5197fc620fa9428f64dddc2d668ba3fd
SHA512036be1efc483799e9fd7584a6a986fe4268108e808a3762c35dd6d47247f82182d74f5a76cc661a3479b3a549a5b36d5d0e4378db95ddce059d4d44bb326fa4b
-
Filesize
8KB
MD5d4ad257b51d83e327ef5c43fcccde649
SHA1b8a7b84b9902c951d08c0198d944b396347d645b
SHA2560c951af0ab831690c64ffe8f29b4860cf9473d84ea0ab61f56a4cc7707f76a49
SHA51232cad2ca9cec8fe2a364513b105728e76928d5214337418f07724c1292424b598ff99cb597258f64cf543a26504494f68e98ada3e363dd2e61c88fdc229d01e5
-
Filesize
2KB
MD5d65eb0fec3ac9d3dd66862fada98ea0c
SHA1f8f1eda87f3bc0755be2cce9e44246055e5886cb
SHA2561ed6162f8ebdd110d099025b15576b6e0411851b40c4af4dbc6674b9819b5e2f
SHA5129badf3b8a6c08fc8108aae75017711e67fc4e6ef7e83375dce21f177116760924ed8b8ceb1227d125a6aebdb923fe4a5ca6ce6982ea656cd60c24f0c9f73ced6
-
Filesize
7KB
MD5413d80f6a132126afc3d76cbc9518874
SHA1a2451c0b1db02220caa16e6c4e91fd5ca5b6ef50
SHA2566c9e77a0bb463ceeabc4f7c86f2b8bc0c7babc75bc82758c75955ff4c8cafcb1
SHA512290b09681e3b12d445f1bed75cf4e93db2f3da4e307732068f442c58c8a754e8b3751fc37686d3e6f0c346589c0622772be30b195e739e8d19a52c6183edc66a
-
Filesize
63KB
MD58e18d9bece3953d23aafee7bbc593623
SHA13875be87a49a27b1e7520feb7ed43cf8e74597cf
SHA256a46a31677ab88270f0bb1ec3a0875447e8cf8d64993b849ab771c2f1df9bb6a4
SHA5120110b90de219bc82ffa5e2ef13f183ed9398fd1ae8a41a9afef98ce977b357397bf1b7ac8cabf8691bdb4ac6f14044630eddf38aae56dec980a095472db8d26a
-
Filesize
1KB
MD51448b378b783e91401f51f7d3fe37579
SHA18da0963e7b96160af94a1eb850c50e5cbb3b70d0
SHA25638b4a2d25a51d22205056047420b82dececa026935ff6086453f1adba0d386c0
SHA512bb153beb16f097f4fb66faec6eb02f24dc6013642543f5fa7ffedca473c7bbb62c91959abaec4f94707d9a9e20fea65b0934ea823fcfc1866245aa5450ede9c8
-
Filesize
7KB
MD593bdbf2f5ab0b61d6586f593cd9dcd94
SHA1eef85928e689f12b11106d19cb217187b505bd8c
SHA256ebdd83c9a6696e352d00333c5dbed4fba4ca4a675ff461e7ee70cbd26d833929
SHA51226086ef98cbd3cf91366468484c5261d4d6464c0597d8e5f9256da72889e3baecbb40b1db4b05620c5d781e60e66dc5d694294d86207d060f3a211360895e174
-
Filesize
66KB
MD5358a3abc04357bec41ba1abd0edcef3c
SHA15a0452bed1e27d8ce46c9eb94d0762799180d21c
SHA256c852e250adae5d83524931d0b8ca629eaf5039f1d9c68152428cd5f839e35b9d
SHA51221a2a41786a6e686f2b801748f1253200a65f5f5632fe932bc6a8c5bd816161a41843faa4e0970504d9525d6dea6a43e9011b0f0124ab4d610ebab7d90329d58
-
Filesize
2KB
MD54669287f6844e1cac33d9fea1c06d23f
SHA16bc85c1d69d5b2bf9941438596200f4583d16f3d
SHA256f99603d8299ea3e94373d6f63facb85c968fb3caa482b293b83792586feb697e
SHA5125d8cb285fe7b84c0968b87d37fa78ade57259c7934e241ebb3ad8ce136adc00bf7beca747740acd72ce1ae63d6112582cbd69a02679f244e34c7009a0805ad60
-
Filesize
11KB
MD56fcc28ecf3c23f8270af101b177c72a9
SHA11152b38ae6c56e88bad50e3f5f1513b06ea11928
SHA25649cf684b3449caf71b3280e896d7dfe337e402700674c146f90e7c2b98cc7111
SHA5121b486bcf8a8e8438a48f607d4d4573634aaaa1aacfcacf7a4dae2eb4cb4f855526c873275903453f68c89ab3db317e6ae6eaf1ce72da3d5ddea638b6ce8499ae
-
Filesize
64KB
MD5cf13be94e0dc393da41e21731cde59f6
SHA1d92fff8fd4b24c9593e26b01a41decf894639309
SHA256f943be549cb88c7057e115929ef978a1d673109c5edd000189c25b411efe837b
SHA512d1b66887ebc88a095d9cb3aed0fc2f6c11a9892d76826f793a645c70a20af0b5ea9f4cf11c2be865e43bd946181fa2106e974b747b7f995f5ade38c16ad16eb3
-
Filesize
1KB
MD5bafdf8c92dff9d4bd7fb9916f4517ebd
SHA1b1df1955bc1ab78e489832956804b13e0d93ba5d
SHA25665338d0e28d6970e2040e466ecf1a6a109e245a75e5279f17f387aff6864272b
SHA512b1d87d4fd4f11f7b59cda7a3f402aaddad4e5a8459ffd0d7556b6124a8a3ff1f622a9c2846288013a2ebdc0fa9475f6ada05d691c8a76b45d63bb0264a663f92
-
Filesize
3KB
MD510155248b8e5c2f5cc834e07b8934833
SHA184f5f76db5d676926f4d6e5fb96d1d8c4900506e
SHA256a5a90f03154a1087deb8805412a6dc3a2b78d20ca13235a948ebe5ba8fea23ab
SHA512c369cd73cafd719bd109191ce65e463856fc9146ea7fb890eb19c8c261dcdf6f547d3e42e1455fcc0848b2aa5a0ecc19872a4a446c91c35209e82ceca8a083d9
-
Filesize
2KB
MD5e56415ad78328dd8b04c8c94b316cc6a
SHA16ebaf2c0eb0c5627e59d4aa666d023c1ea687460
SHA256ae1a7e8dc6b32f2ddc9c30773a48830b18aeafbec2c53ea36c58074533a3293f
SHA5122556191a5e84f5b3052eb338515d1dfe957636ea664f67d297961ff6296fdf6fef1c2c9c6ebccd4ff5751473261cb80ebf03386be54e275f03c252344b12d1eb
-
Filesize
9KB
MD594c838759cbedee22928ec33813f593e
SHA1dec58f346656c38dc90653f9a9d9763097075232
SHA256b7d71c722240375bacbd85fab4ba880cdd75e00cd363f63e7ac8d4e78269e9de
SHA512176de5b0865ac437812b0a12ac2b447c9872d8879ef1e5fde5967bfa09226573aed46fc209575b06507b76dbad49ff5810fd92b36a4451fa4d704834331d2d5e
-
Filesize
2KB
MD5ceb22c296fa0f8fb64573da8e8903a36
SHA1c04bf80fb12ed2343092f66039f6eed91c29ece5
SHA256c8b3c429202c47dcfa00fccabf4b4cee3cf27d39e524013637ad2155f193ff6c
SHA5129e06018129ab1eb602e7d1eac48aad9baed3456cfccfad324b368c8cbad5b043e0337a54844cbbd3b1d2e183743a28a84d579c6a56a7a67cab206c18c096ab0a
-
Filesize
68KB
MD590887ae80ed340efd8535575f15ba5ca
SHA13061df75c470e0bcd9b321f4f5956b0626292040
SHA25693c8708ee162eebe5727f4b41e71dce880e85258676c4a9eb572499d03af59d5
SHA512e955d2da90be2470092472bc991740ce43c265dda8474800d035f0167e583c0c92fc559693ff9680fcab7f2cbbb26b30640466e19b40bafcfd42248cc951d9d6
-
Filesize
8KB
MD53a12ba6637cd6f39005757a732aaabeb
SHA165e594e15b3647568cd1bd912625fa7a223f211a
SHA256c46cfd1cff181d65f0984d8fa92888c69ccf2615a9d04fd6bf87e4503cda97b1
SHA51212464dc4905f08393b7a717d41b2717dc7e68f4eecaeffbb0941054dff6286ccd56c6e474f097f7cc9ace4a21dad2af751e191fac2ead8b44db1ebb110863e3c
-
Filesize
66KB
MD5d2ea5fe712a33a2d2f34312ae28dd8c6
SHA12aa4c00bb4406ad2cf7ab4ce1009f92e3318c07c
SHA2567fa45b7a31681e383cb53b3ca2f5e0f35c58056ffc0ae9d6b0e2032c8808aa71
SHA512b1f573f89b97c59e97255dadf0582dd48b942d44980e3ac75dc5efa119061cc748c645dd031de513553d0945cc9a006f98f19e8ce92056ba9bd72feef6cea89d
-
Filesize
6.7MB
MD5810892aa6d67bd44989d1719da499761
SHA182a93c58562633a8367fbea2fcd5bf093c8c9488
SHA256fa0d5ca67d218b3296b4243c39f5c9817b307f227145b5e9c867fae77336fdbc
SHA512181ed240f702463d302730dcb4a80fa223bf6a261eb298c884da4da1623829d3987f6c22a9157c649d58dd3d8983ef6e6f797bc2c600e0abcbdf7e697660ddb4
-
Filesize
6.0MB
MD55c84e333ba73bc752319920b07fe13c5
SHA1bade0844ff4cecd57a6199d5b5c8bf5eec5e365a
SHA256861de5dae25b29df9aac08342283a2731c070795c90c9aa7e900dec27bb9bd35
SHA512380d60efbf6ddad2f26f3fdeb61704a3d0d369be8bd8ffce095ebf95272832de0abff8bd490821694cb7e8c69aede0ce9f388009d9126e7f7187c50f48450e26
-
Filesize
7.9MB
MD5705726faa8e1368a36a7f6a40e5e2c18
SHA1502c50d7841afc067397653c2de41b4a3b1e714b
SHA25656e76abae8f68e328b8c9e827023b2fa8af04d229933f31f3e8e1bbf0ba18780
SHA51221770d56250099fd00b16d2d4d47a729d5a3e95557e48dc23933463d1d203607ee351892187309b97c33f252dbcc607f10a2a289d1ce0d19a8702fc71093eea2
-
Filesize
10.6MB
MD59d92e5d067ff3f98a31a29f88c5e9b1f
SHA1b78a23f89069922d4fd1c8323a7ee58df275ec27
SHA256917fd63a02065d297b8c92f1afebba63d5b6de6767dd1c40702cf940bb1e0e00
SHA512f1f2fadc4cae8367b595c63a0c09945839d3f1580d281f1ba960f1858126a4d73c5864cb97441034db51d93f539211804ab0aab220df71f6b2101b5121dd94ae
-
Filesize
6.9MB
MD51917194ec4686f9ae389d5a0790e3554
SHA1f324bbb1b10ab3555211e31d67bd742f0810eb97
SHA256e3abc538c791ae0cacafb260d82f242ed39e16828e2adbd36dc55d150f3ffb03
SHA51235309bc4a770434ab16885678a0e00332668aaca84d310a04934dd66b34e504178c077fa4c1cb36e3d5f3791bc799230c203d0966e4333780b4cb8978d86b481
-
Filesize
3.6MB
MD5eb92f57471cab0d1f5ba51536202d6c7
SHA18b52c7783bf23513797a1b3715a95c0c82c05b83
SHA2566498abae19ed829f6a0854c2f14e35b10f9712bb4ca08a67d13e331428a19bfa
SHA5125ae26bc2df874a96b3dcce526e75a753148ef98d0245184097ebba1f9e27750dc911e7808f703be6493d6348ecef1a9ab685f4f5db6311970e308d1dc8586fc2
-
Filesize
5.8MB
MD52ec0520be1322def424023a89a0e1326
SHA1f70c10436e30e82aa2cbf6df986fcd0d28e04a76
SHA256f1b545a2450def809c4add05201f1b2b511ca78d1ba7e4a0ffd1e18bb98c8ac0
SHA51276c37403f73825ca07ba97aa4a9d790433be2202845b43a542a756fe45cc8c34053f7f41330208459ae50d1d1c2441589e7b5cd2c4c621e72e152c9c86e8475c
-
Filesize
364KB
MD54f66242ff6bc36b376a16435e428471c
SHA134e44fd2b4b4d3f325983120a509a96f549513aa
SHA256e7244f04f414f5203e63c4edb4efc30f165316758c7ef3da2843338b6a1fe15c
SHA512e6ee7fce0c9f2d5932151df04db4332473cb9fc03fecdf7a3802b197b69b850cc964e13dc1012bf50b1393f6b176c0043d30c1b06724a6444a516e6c7f1c601a
-
Filesize
2KB
MD5f59fcf34aa5b0143b66257937921e7d3
SHA170611effbaeb9b37823e83a574a381864192ebbf
SHA2561b54ee70b3e0ad1d94c7cfde80f0e0b62708d78af6a6129b5902046051ff820e
SHA51260f7bd3e449e5710212b4599a73ecf550bfa48d0679231c90b5674e9a24c0b769971cfa6d52b29a5808b5c9ef05c900c9559232b6f22ce085fae155383f399c6
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\help_restore_files_vhfto.txt
Filesize2KB
MD57978318b3f74c721c3b48b4c5c95f910
SHA1b7a1efb26fc1f356425789a4fcf22c80fc618e46
SHA2567d12da16bf311f7746e7f4ba56b24f60e840509a07f31a418aeb40f806c3d41b
SHA51269594989ccd4330a398a5bfde5a3ff3e4d7932698be2f03d006d41c7c8634c368418449f999298f339141aeda53f0e6daf91f65c7bd542572959d3546765d4c0
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD54ff6989d086ce3c68e49b442b5db6ec6
SHA1ad1d6803d8b6f54969b0035dc1b9dda866d65f21
SHA25681c8f1bd119be53e8080046e3fbc1576a4a5ae60e07399295a2b6ff5bad4a66d
SHA51253bf09d9ad726bb706e903128cca5fa4c534cca679d83470bf3092e8b836df0aadf6433b7d12570dc071a026b2e2e937609c5a0da11dda0afc4ecdab0d31ce3d
-
Filesize
2KB
MD56e742fd56d99b9cd97cb76132277e729
SHA10e79bbe968d83755d5c932f22c9eed7dd1c718f7
SHA256a048ca7922b64ac073a7940d67ec01596eefc3bcfa5455b7e9ee3d481818b2cc
SHA51235cea8d4e25002bebaed679e498644abd3bd0f0274e70c31fc84cba4e2dd45efe2299c6a9847376a0a99970f5046e7609e3a7c8df21054ddd5a6580dc2454545
-
C:\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\asasin-46a3.htm
Filesize8KB
MD53d805f892b4b5911611fa0137d43ac3d
SHA1bebd45f5c577ae3c69c804f117260799c6aa54ab
SHA25645ed6ecd845ed78d9f5458694804e1f12c3573e64bb34e2b6b41f694faf5b88c
SHA5126b35f4a9f8162084c6209cd7302614799e089fb9055f2ff4174cef7e2def54f810ca1553c4e357227912aef0e7c718b2e0c47b890150a5f84db37c07aa2f05b4
-
Filesize
4KB
MD5213d819705cf9c3aea405eee070b8fe3
SHA1bf6d7d9f2220bf0a87d58a08d862798be9785f7d
SHA25634755e8b504b0a2694322cc5396274b3c1753dfc347e3efa634e5bb658091fd2
SHA512faf57cb91036037570143828bbfa89425f7dc72c16f0c16299113e1dc7e85090819fa74e7e1f056fcab5b98164d8c84b46fc63db7d2f6f8adae7688d5077b4a6
-
C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\asasin-ebf1.htm
Filesize8KB
MD5715be74f8648d46672206f4fe70b835e
SHA1e870d87ea0c0e817257b26299c2797073f3b569d
SHA256f235b2e1d90faaf74d1ad6bdbe316f05dbff2616a7f68269ba114e212dc5b67f
SHA5120bf41c956866f21c9583620e60de819c8780c99391375a93dd1edf41901153a478ab32afde09195a8be22872c91c903d99e2e94a022c48b9a6474b0ac29cfb2c
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5998d8338a8e18192e8536c059774eccb
SHA1ad261cbcac4fdb903b1bd015035402e108170a54
SHA256e9a17b1e0afdecec8255a5a68949587535296219d6e1ac99bfcc2e0cd8bb9e96
SHA51290e5ec02344a38529a8dc8f66fe480c509117e2e423e542d0be82806304d7f0cf347a26a88d2412c1963d1ce3f27cf0b468e458abd45f8420babf872e929ea84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
Filesize252B
MD56f445c5943fa626b54f1ff5b1ad35869
SHA1cb7116471e7b3f543b2d7d802bf0c840d8e508bd
SHA256e364ffa0ed7443264b70255abf74ebd0a515c94fbf65c90bb983f485b0665fc3
SHA5122aaafcfc21bbcb31602fff86190ab145c79c6e2662f4709d96494e7985191188d3c9ddd8255f338a8b2cd3f929694c21a73f7292322dd69326e4fc225c11fd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007759e0ea12981903d7781c2f9cb953
SHA1b39fa983874d07339c54e7b868cac8aea232198a
SHA256154114843efcdb48cd4d365d20335045bf95ee4656c90b6b3a3facd483e9614f
SHA512c201e91b5dfd7c1b62e6dc47297d18de869f5bfe207d4c4d39a5cf983e1530ab787489b3ea7059952649ef4bfd6c08bddf2076a26329d273a32181109d08fa56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54579a3a11fbdec2fff5067510fd4fee9
SHA11ec04cccce87a8efeb3e919115c6a643a17bf82a
SHA256470e95f9d5d86d5ca25428abe4e2de46dd7dcc3c8280a9f4087ae42cca18df03
SHA512fc62ab8453e9c3f2cab7bfd6a92f4b01ee289193a010b173fe3ecd69dd657feb6ddfd90fac9a791ba74f12804fcdc41bd9857a305afbecc9dcca90dcbf997307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c434243f529be803a39c7e2361adce
SHA1d270bafe3d87c49a08027a50864e7c29b9261190
SHA256babf1ade56cb383922b7376958f3f5462bdf5e1bf4d0a25021ff1a82a5ac6bd1
SHA5129d8286a4aeda8d6f1e2180d20ca1d99f8d874746e07d49bb66750b6f17311029a6a3d8ef229a12c0002d96a481d18aaec994410e4e8fdb1ef73bfc8710f9dc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436a35f37ea2a92f5d50d9a802079d26
SHA19834e44d4d9961e16ddfe6bd1ccf420672f12915
SHA2567efe85056127af439e06519e2528b8391d703bac3de4dc09ed3092aaf4f8e4a0
SHA512ffc10cbff2f3fa07f831d53455170782ad412ff5d26b9af70d832bf8312601bcd954d11886cad117007ab6f617ed4965f6bf1e356c59a0cca0c176eb05aeaea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e8c0fd646419bfd895c4066e06d10f
SHA172678481681863e21b8212707486b769a2bb75de
SHA25640d7e8aa00026ec252e841ee4f577d994612572aea8fcb72188baec20185d374
SHA51203e5025c2f980512e31c49f85dee0f174080609110ff98131b5310c00794cc51196ceaeb7e8acdcda9b31b818e207a82b3b9e11f932581d2d0b1dbbbe76db245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5725328defc2ebf4f8343c9f4ec66982e
SHA10a4e9326e9f4104861a08bf36c864a910f780299
SHA25605c3e874623c0b27199137676b15c06cdf91b3d94309011a161b2de4b1a3c5aa
SHA512c5c425eda974cca8f220bca21ad2ba2ac04649b57a84cf597ab4eb79f679d163955124b49e43c7beb8e0b41dc8b02201bb6c951d738d0d67c597224c506497da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455e87661fee83738842e8222bf8188e
SHA160f8369d5a1f14a5f96702dc240da58e6be1825e
SHA25685f2feb5f0856bda56ab390b58bb41ce86d07083a4e6b72d6fa9115ae2c8c298
SHA5122b7834bed77f96f434b159a6a96f306cb4b784c9535c2b31709210199fe93dbc60058b6698b46cae9a7c096a3ae275017e131e3d65733dfa8a43d99d05681424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb929acdfa970fd2069f1d3db7ef4e9
SHA16f58496178d0116e14a7c47aba6d961ef3bcf259
SHA256456f34ce70683524c202a2472ec8a4fdc239df55e7c6ddc099e98332164a8679
SHA512bcbc9727561641a3d5015218e3de58e3d17c78bd54836d81997ad077e953f05badfee586cf522216f918f6c6c976b61c27b56f3d9b2637c980ccd4d620b1e8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f6a48d6187ee84cf35db7520884208
SHA1fac0197de299ec4143e80eec669f3f4d69a41b1f
SHA256bbd3bbc91ddda279f5fc00409ac017d6d38aa135fe06ba501dfff21b1b1ffb54
SHA5124cc62c86577ade96fc80210ce948a187bd26091848e735f836d36335267c9e8a1663e6270eee283a0b28413b920b48ca0be4c0667ca4a62bc7e2a10482311ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e651a33fdd75cf6400d02a1d11a95e81
SHA1a32b12a350f1d9cfdf037fc813ff9bf5d18e807b
SHA256fd2fe914be19501c8bffb84bbcaffd586e465d714a59275e42b4148390579c0e
SHA512ed7e212c7fb0f7b699c0c0d7fb4bba458698dcb640d3adcf499e721fa0ce2761f8856ae4f30bb9e009db9ded662e5ecf10e277be84cc1ee8caf164700352ec83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6311da1fd56e1cdb433ef6aaca8c2f9
SHA14121a6de9265d0eb9650e41a64bddd45a0bac21d
SHA2566a5ff3c260c51527cf56960e3ec26dc18296e18d10307b86ef284d2da337cb86
SHA51238bf73b6589b07f6e5e593f6f7120696f29b4d833ef2d92354b1cf01794104d16b9b5152261a17142de9cd8c78eba5bc9ef92cac12bf3bcc7d414e4a5d99f9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2be3f8b4583810e6949f6503b0f813c
SHA19b60e6f7d5a281556d7673f42758913273c5515c
SHA25665479cb32fc3e80e5abf5f8c652048c0a86d84fc8f90a1830167419049579334
SHA512ed17ac21a5c9d3ea2025ab0cfab515aca267eb09461cc54971c4b1acb16094b32195deb1c9da8a08ab1f276449ffa069abb03dcc66e818fef215236fb4980a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b400736b283af181b08e7c54781809
SHA1ec1132729a07074934bbf7e762660a7c7bf56d0b
SHA2561c512ac38d9c068145c553809dbe3aee4444f4371d4b13579bef8d1aa72dc80f
SHA51281c33eaf1830aa678ac2c4a6ffcc87ec019e62abfd6e8eedfbcd82e4ada862f358c3e6bdc9b22ae85ad16abc957b12ffd1b240927913ad60513d97332dea525e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565113e811b0d7f048e55cfb4ee28aa9c
SHA17a306c6e8faf61d0125325771e7b6d6eacb2e5a5
SHA256044f3d08f20a3ea1df6630026d0ba32218559ce43c9bbf2b442fb591f5802ca9
SHA5128521abe15ee37adbaff7f821bc77d972a8b27e46540ecc2624573f185c9adbcc21b9ef7c38f70c6b0d6e2aeda4c692d2065427af64ab7d347ad845052ea7601a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf20f6df46f0a390b33ffb8a57a03970
SHA168a06aae55a2b6ee422be641857b3cc58d7d5baf
SHA256f2d6f98060a9ce90be0d2cf52603f4eaaae83adac4e903e88d34803c911712ef
SHA51233e8b3ef4871987fe6ee68aae4155b5806374c77d7726ccecc87a6477276dacee8a674f250ebdaf7822bad973ae5314ffeeb108d15dbbfea94af7a8ae40284ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55466bef812b876ae34f3061c5a170779
SHA1d1858eaf0416ffa4ec4178a2215c1e9eb4893081
SHA25675267dacfc98053e30ee3c5a1367c142058be2b255e46a504e826ded8e9a6250
SHA512a3ea7d0096e0d6a540f84cb3b449158d2f89caa3d8051f109abaad334fed1d694c0e756e1850b5dbc53dc1e4966761c969c2d2f19f696c0ef61a11d7965b6b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0637ccfee6607643a27728474b2ec16
SHA131213726f43230c3b5655c95c3f872f146ae026c
SHA2569139851efab67903a2376533cc1050fe52a94ab5e64c4033ffe183a010e0238b
SHA5127e0cc3cb871717580141c04d1c249454be02443550f531228bcbfb779100fec66716157283f3168f01fbb0120c00c8784299b1362f958b41ff94fcede3c12376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54735e61908ca41a381ecfdfad5c55237
SHA1900123cea3954119d5e33807517396aa4ff672e0
SHA256b586c121ef5828e805a1ae277eaa9157621d581d41e1888e1e88acc5ab098c0e
SHA5123cfc89b6f75dc12faa035268cb1bfe078f2275480e162be81b8f949ad2e1809be8b5e14ae77029574936e8923297996ee7c4e9e1bc23382ddd1d47aa1fbbb2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb389e94d08559affce1d29759b4622
SHA12e6b35025261f418ac86c6a630254261e4fb22a7
SHA2567f83ad10e7e494cd61b29d6f0aa91920e93c4d594bebd988518dbeea0ce34a09
SHA5127729c8f776602f3ed695be8f940cee55d963127cbce03385f666f3debe3c5081a9341c465dfc503d038d97e4cadc8ae140997041cdf5f1f90c48905952dadfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57beb0a886f17fc2393f117e264d87213
SHA1357bc2a4554b42341d240f5d305f5787fbb9d697
SHA256f39d37fc6ee1941ab921ebb65101f44cc11f005c2624846c070cc934fa9bc6b8
SHA5127f3001d2299e37642006e911c4c0c2fee259bca6d62ca5ea74484eccf90175e9a545f28a37574f79d51497ab4136d1c171cc9857530f9b16847aaddf6f60e634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53183f377ae1a1e36a2b168c085784876
SHA108f38a40fe3853c1dddc954625cdcf1f9c5387eb
SHA256a231e6447fbbd7b24c68188b06828f02a48973e9e9aa012040a92bea3a2a3ec0
SHA51216abf461fce4147159a469464323ff9d16e4b118a4a436befe0cece847dc8b8c6238048d3b24b97dd3ce5af252234b0a78c5980be8cc39bb47e682c17586a644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe2d2d1ff11f307879a6ce29f4fda8a
SHA1b966c03286ce833be77e33d23fe534d2de71c4bf
SHA256d796ea757d869150720a70260d061c86e661005c21140fa79fa5d95323f72d09
SHA512f72bf3f6cc6a76c38ec060c4d54a6377ddb10f988babc2f075569cfabc85b368c420b54ac7dbeeeee9b5b1fcdb0bcd8c0906491900c6ad7c3cd58861f70a9a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80b99e69229869fd29a9736604b5946
SHA1f24bc6b175cad5bcde25d3f11989cb5c1bb16426
SHA256b13f8c7ec21ea487e9dad00cf664ae6f8ec66bcc1351c7c0c45dec622ab113cd
SHA512c6b5ea6b85caeddb249e1b71ee1c4c7d9af8a15e370bd8efe99a59e336b1d8dff9a3abe0a8612f5f1e7c8387bde8993846ef38ef5c9ab9fba8c55022fb69b8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2c89a20cc4c1d422cb91ef39bd1634
SHA1c62dd63e50b05a7f88d80fd57b236b0716a35a16
SHA256dc606eceacbfa2bd01f201300794be6a7d0421e55f473e0d9951d8c059c3216c
SHA51255c7815b77e967b33196c9cc7b2f68fc25bd0a8fbacb9a4a721410a284916239c7c81d9c4054f53cb7d278e62d5b0dc1f439b5ad1061f40ea74e9d0b30c48fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddc06424d52ec4185f4ee757ffed375
SHA172a55a4f6f123c3c07bec9f903b6e5d9367b9e90
SHA25629a742ea45edfce1a4811d680972f35012a7d899b5ca56086c7f18d1bace9712
SHA5126f93ad8a0c47c3cd8cf960c4a044e5d0cff68df4417ca7f8ac504c0a109406ff8dc7b658b0ff8ee45123776f8636b7adc162d2d8d6932a48242f93693e76b374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012a0aa7fb4efaa96565a4079621b815
SHA1df23541a5eee4a7ec1f767978b159ac950b7f748
SHA256cfdd0da2bb3cb437d6fab42cbfca56f831156d501b512ff8e0ebfb70320c8c7d
SHA512679362c6d5f45fd3b1d2e16929a7b0db2d47d7061413b3cfad3b69eed14ef128ebca8daa5decb4455281d12061f8e935caac26fab748d8457a2d67928b011d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ff8f3fcd27854eb859d5bf14c4960a
SHA17aaa758e7e1339557f48b2548b9d052cbd2aba1e
SHA25629133c5db7b25802fd1b9b5d0c41c59620934ef673c302713f2029a81d4fb9e0
SHA51214e5a18f953d2f17248f2d569a64db9e6f52daf2c0f7e76084c71a81e28ff5a451c879c91aac032fcf47ca6b4f5f9b4a677a1d5226a4366ad967e53676b42b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a355d304d1039def335c306bc75dab
SHA1dd1faf7e3e7eb43de8fc3bcc3a200787e324c864
SHA256a9cb1e3f53d9c496d0823dc0cf331f89f20e612a9edfe13b207e940db91acd50
SHA512e72b3b54b7c3b66c1e08aa2008d0d79f95f29cc34022eec22b4dec0b2ce217fd3f163f0114416d05b3cf77edfdc4759c0f255d7bd5a9c0d7e8abb076525b649d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54579120c218c956b9e9ba666fcdeabc9
SHA15a85a8dfd5ea882701377f8bd990e2c0628bd889
SHA2565b4aba99ad3754db2f6bb17d395ad5626328fde5d8595e25170a6221d4f3e473
SHA5126c24f1815b0ee7129fd5cf02fac2adf82004ca9600a30ba9df927453b97a135c41b485a1e5c3f0c8edeb621ac6728d3049df81cfd12da4ea6e7483193d252944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c96591c2dd0ab978d1525c4eb55978
SHA1289de67cb750518c1e32ae1761457c96a0b12faf
SHA2561602abbf0bca62b405aa6d8ce2caa6ccd6e43fea9fcc32e4c0ad72335059d149
SHA512b754624deb31f117f660d35dc5b1b98227b43067337e7c56223814b632e1d39508e6c74a0e68ea601673d4988988c26544e81550cca946a85ca8ff2285fa6e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a900d357ab293583ccd75b285ebd1a
SHA17724e4f7e5d2166dfe51a9c09e49d9d4e0774e15
SHA256396765e64f8889d08578d468d82845141ed03a4aca48521c3b1b99fcf2364b46
SHA512cd8dc32661f9798bcaa09472619eb3cbd373efb38e9a0c5212e518731e7ce7cdc80cc7ad305ac3e07a784e7203fb207519858d308afa22f1290fbc17abf0e201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b165eb475d62396d878ee8db03386252
SHA1b3ed38636a72eba6210b890a1a5eade70b29fae9
SHA256fde809ed90b101911e46426366feb6214a705b2e23d4bb7cc37be05842a43120
SHA5123a65730ae4e20955691b100e4e750e8711205243156a94f38360d9da54a1fc5d9e6a6b4453392ea578a21985ab6513b20beeedd646b911f7fca0109600f441e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad144d55a0bc81a2155f81dc5c304f2
SHA1287bc0ff403858d1c3326b06d78e812553f645f5
SHA256ad589e4ca8ea752c1ec289f8722b7684913ef3c887a288f7393fc9503f63b311
SHA51212124c72a691831aac2ff9f0a36f922b6a2d2c009bda438dbca96f9cb4d309ad854b1cab5eabe61b7b6973dccc1f10f478228b6d982b9a20ef83f01046150355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026380425679fcd9c83a50a06a625d1b
SHA172bc496e45ca181ade918d4c602cdcc01124779f
SHA256a4e0be623679534e6ae1b2b6f22d5650c1558e15af60f6b67f1a4e6757415e48
SHA5128d0fc55d5492a586e3142f5b4ce8101c6603b515894b8e41f2e13c5810e4b8b5b95a8f8be075f94feecbbee4ab53c1211351431b401d66946c6d3c63f75df140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc06ef9cc605402dcad41e87bcaeae87
SHA13948ca24d86081b9833806592bf4413c3bd2c330
SHA256e160eb935fdec4efb665d6976019c4d0a39517c5b9f76148d2889658f60e3a08
SHA5128da9f97f90489a14c9d12fd0679e7c1020264808a39f9a96916d5a039b94730beef7c5b0cdb268f9d36b7cfd4cebec89663ebc29289fc86e3cb0387b74d517e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753aa907adb47dc838c901474b2c80eb
SHA1bc1bb4584383a935a15d786ffdffe76a317e6118
SHA256dd10d5b9eefe4ba5ec5f24f914ee17d62e5f55f3662ec919f3d93ccc5fd68496
SHA512a98fe810c833ccfb3276d74277595c946d9aa044b2c0f25bba0dd3ae8174a272a731d02c8d0aa3494c6d0d9e9db225d7fa0434ec67564d0f99bb30b0b53b6122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf4b25c7c83e0d413ad65d1096db416
SHA148b6671daf8caf6480bf10d1ec17082738a1c381
SHA2562c540c77f40ccfaa6d1257abc1b5f7570b2d39c805b8f18a006a2c8eb24bb5f6
SHA51275a2bd8b4c113fc1af5285ef82c1765c87fa7c7473c3a17521bc6a77ffc0101b50d25c7216496f4c044acf9bbd2f5c76a993e3c6c7fb95d50e5505ed72a09929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110c2923b6fdcd910b2534288d2c9d94
SHA10b8818071504b3d7cbfd457ceeae6714b7445f8d
SHA2563cf4233995f24fb9e5ee40bc7b9927dff31b475572c2f3aaaa1093c519c241c0
SHA5124810eb52484fd057abbb9b8fb562c066afa8986864050e54ad539d8903b28e030d98530f3aed7f0b5681a8e2689351fd3553c08374be5e8fb43e176734a3098b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e9abda026d361fd54bf5bde7495019
SHA1d8e19e95f611238b136fc94f231451a81bb11728
SHA256c9584819182cceba06413cfa15911d00941a47622a415997214f0d5155941a33
SHA5122d5e66578f3dbbb66da8d2fb0fcbd7572824f97db21c53964a3c62586a3e7042a90c7f8dabffa01b6337dc5c574254a0e3dbc8688de8dcbb043ef491e50a1bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556768176b4d5b6b6c130393444d14b01
SHA16e5f7fb3dc9221beafc6abb3bbc45fdf950a95f0
SHA2567e73fa7105044bd6f9eb16bd691b44ca34da6eafcf104352a1a7438252785a7b
SHA512bbc99f9efd1f114d2e205c845359deba7a103f84bed4d0ad201c3e08b91d6d971081dc017bee24141bbb40865c2c8f1aeb126cbe730469630659a892fc25bcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0afb9d357ca3fa40b2ed7a2483f0d1
SHA1111b119d2db5c2bcb9ec08950af72678c20c9ae9
SHA25623c5372007090897f4a740a9c7c5c11b23921d59adf41d39dc7e115c69c1a5b9
SHA512fe29a715a5b83ce500956f174c2c54bb01ac8a04f42c04a567bc8fe3498cbaa1af1da4e6d29f0add5e9959966afb9c597937045a7ef1ea8359ea1d35ef7afa11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ae2c6fa2702586fa36e7c4deeef76e
SHA1089439c59f94567b9f8485323c0c495ab58aee80
SHA2568a8b24abe018226675e001bbbb843bfc64004395a5b0ab4a5ca6e54f5443a66f
SHA51282299cd04d0df74d14872ebe0bd7769e2ff30b0c52e6195affedf0d81b2e1e1da3898b4db4a4b69020502d33925b205b1f172a88fd47217fc179461ac7df81d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2c3f0ec3a4e75fe393ef77957beb8c
SHA10d1bfe452bfef747f6a3d35d85ce6b6b25cc2372
SHA2560cc4110a3dbbab0e31d7eb3334c2d84e8715c288ec101881559596c115951812
SHA512256daec59d099cb21eee22e587bd0ffd338972dab3204c1d74aecdc391a9600f999449822967e7b86ef1a19685269a1284f2ede8b8083c11846dc7bf0170f681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fed86b618b0a3b475cc4209c7046843
SHA1cf529be8a485a2a340facce1823037d493515ea1
SHA256daead20bfd2e7f686eecd3645bfe3b463082e67aa4412c539735eafbf7479b47
SHA512ac4955f72c413f07cad25bc79fd4300cfc3086bf2da5ff6c48e10493e1368dd08cd5272c0648b9b2e18cb4fea6b153828fca50f3cbfa8d3f7241e71a025a0ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6016895fcbb1f529ce98ced39e54ae0
SHA1597e40cabdf0b08d36a2fa9d8ab522d8dbf6ff23
SHA256174b487d73775af0e8588644d7d6de00696f9ca756fa53fb19698c9cf9fd4f9f
SHA51204d56d0823d9cc23f21a4e747d20f99660131c346a2a1b99490facd31235586c54940d3a47932d4d810746ffe22a1c5a9d0523bd01f7a3c8b8bc9ea9103df45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555199e180bffdf72de14f8280a567464
SHA1699b65bdf5e3fb2e2f8f60f0da907762808a5611
SHA25614ecfb0011e61754ae9c4e9ac16e91cdfd49d12df20b757e9a0fb51c79684eec
SHA512fe27d41f564c11ef0f57e936ec288fbd131a572cd3f5f57411b98001808b79e6bd1f470f3430ac03d81a4edf17aa88ba52687088c37707e8f1e5f73b40ee7e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553207518703d80f0b12d11fbc256bdb6
SHA14022818a87eb70aacf176b6a7789d63b57b3927b
SHA2563ce687a270b462931af878543f470cb52abffaf38dc798ced81260e6cf56544b
SHA512445db60a84b2c9a4443756f7f224815e8aa84a96a80b1acf826a883e8a7bb06aec88b81240d907d599bf96e501c888881a58e365ca0b36f3c4a90d2969a75f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f98b816fe10229d97c2a185b754eae7
SHA1fbf94c2ae273f56db96d63d602f39ba276a86b83
SHA256594900d04930618df95fca7885e5c10283fa7b9ff87b728d61234c23fbba71f1
SHA512852a723801ffb2ceecde3e50f13972190e4578cf662cf87b23bf18971fa15a40a2c40b2266048237fa3b03e7820b8e57479516008ef2b0da232a046210163b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ea032b419e95e46166d2090e0952d3
SHA17af033ed8ad608f983b98b298515775ff3800e8c
SHA2568704112f0796040d0cbe4874f6f2e36602eab7bde635d803dc1e37e09044ba1f
SHA51210c01ad08cc1d9f28ee8d5ddd69496e4180812f7efa5a3d7654ec3105e32532133890e3d7ce8a4421b07e745b03a56157fc19bc2acfd4460dcf1cf8d2e235193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af781a3771423f6ecb39e3a8551ee588
SHA191f9a97eda0cb7224e38ecd79fd3e70754cf3461
SHA25614d89a37bf1ce582c9dfae14bf55f1aa2c5591dccab87b7c83a96040c6301795
SHA51255cdfd61f552c1e367ed5f59a31938c6c956ab304ebbc376485a29518cfc35145e8c49a32c54adf25107b469c65a6a731d746accfd46482d301b558b7e141af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d908d926f8c3cbeafffdf29fa1127f
SHA14d08a2b225e6444263801dcd5500e122c3fe1c2f
SHA256885b3b12800c26bc8d7aa49067676fe1869155c4dc867c46dde9e70f42c839e3
SHA512b183f281fd11458ce6623b2af741be84ce73a6d0a209088d893d0cdbfc7477c4afd4194a78b4c38208798a521c01af1008a776a74c9b4b28a68eae8f5d30fb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eda00fc6d81d961cf2bdb4089566588
SHA16d9c37cf70c5289158b9cfbc1110ae1ca87208f6
SHA2567d492cd6ce4ed8f725e8ffa9385c5540d650619da8077b5de37c150a332ee03d
SHA512b28a1c0c5916398c1c9fcabefc844366811fd1f40f3b98f85d4ca0c220440e9a6de9def23036f3015a9b677b17b0b800a18a6a9f492b06881dd1d969ff378ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56400c7118a5c69737f0e334f017205e8
SHA120255ebac30725eae038dd8a9e1a7fffca9d9fd0
SHA256efa04c4980f28739c8921623ae025a0a3e07f07aede9963d9bb89d3bf5cd08e5
SHA5124e4dec2e311c3cafdb3275065348f7148ce9e99897d4d0ec76286426f51e2bf3329b3b8aefdb028f63605491496e08f8748d6df2a1335dce947131cd27857823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f531d7284be22b69138329dbccd75f
SHA11e6ff88938f5bb1bad3107f757d3c058c414b1fe
SHA256d09e6a1bf46b1d302ad61a5ac3e4e0f66223d22534bf64c72fe85c0168bb5989
SHA512b10bc93896d1dc8746fc66bfea476ae6563a3aff460cf829aa1f52eca331810810b5501ebbf7d861c8260d615d53b9cbd6da8badd2caa1f7ef2dfe81e878cf47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54457f8b86889284ed51b787ad1cf7d1d
SHA1de4b6e7b3f3950334c7f7ae35c0d46bb789bbf2d
SHA256486751e99b2e120b0a944b118752e092fc401c3f0b1be310fd33a6e5625a8c4f
SHA51240188e3443a81643bc4393ef70ed09683935d4eddcaa541e31c7433063e72f938016d3384bf9e61852462d6f6bf3c9f9ce612cc8f964a99cb369c9c0e4b42586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c087aa9247e7d0a965d93a12fc9df47b
SHA199b45ef4b817507676cc90df453dfda2f8fba405
SHA25683279b199ddee9cb6657e92c99a674055722a5e7ace393c6b2ba8aef8e740bdc
SHA512823d48a87453076a0c753215f031cb7c474b29edf8a6a80291564609b8b857e84b3b4fb9a3e874c05df648d70731ec57714ad822f11c32234b3d509fe4c1951b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e30341d3d656893142c402aed52be1
SHA1ad1f43990e560a0b1357b6ef0aeb168ad4415060
SHA2565f7858225abfcdcf0dcf417e70838e501b1be79363050093e3f4b37ef1dd70a4
SHA512116a45de33f23fb088df4b54f18cd8da2e195dfb07ca5e29c749499f982c9e3c1f237d3ec072556769abab80a617b5569ccce0744335e76820db6d277d4d0238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea203891484c9c7c06a13e10199d64f3
SHA188d111d0f9677c73d03f185a952b1b3eca8cb527
SHA256d1b13ec62d7a424187b7c169b6d85f32698215d508901f657f606445c898f683
SHA5120da01240837b763f6c02b5cf57b1193af4a7038547bca01de342d046639c50746cd03f50bcc80f2abe7cf6c26457ce4247cc579561eae4c4f0856b7382e0fdb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a458531c8bc5725641ced2ec2661b884
SHA19bd052fc6f2383af8474c3b11317d53be1de41e0
SHA256b9615a7fad2eb6aded5cad780ac6f32123267cb7c26b84562b395862479ff62c
SHA5120d069b9382c7b3581045baf784292cab3fe12856521695660d9f413563c8a749b1a9ba505ad9a620431163dc3c15ea7925782055b4a86eea2e090909f2437e01
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD50c0a050b0ccfab6bfe6e9c39ce991905
SHA1f11493651ceaa8604a24d2c25e6e3969034fcd15
SHA256a17f7c24836cb3a3f3d1afd5deb473334a7695f0414188236a46d5eecb45f20d
SHA51270d50b13d679b61857e21b5e29e205e7114988bf404173d7ee33d5245085559698ea8bf527b627662a0d1ffaac8c597a791ec19321ce8c924b2e920d0235590d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5fa9c6e397f030c3eaf2756fd54d707df
SHA199c845ec18274a04c74516c5e36fb965a29982b7
SHA2565eeddac776b89caf72d93fa478b04bac94c58365b84d563a61616c6097019887
SHA512110f23801cdfe00df517118a773369e00eeb9f5612841c87d87e04d7404de8df6302b8a613f9d750d48a0c7f7c3ee8a2b3a47f34df9a671580d6345e5d336e46
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize5KB
MD5ed2bd277c5f2a132d7173fca61e85602
SHA15abd2efef1611a67a012cce4e569235a3b57cdef
SHA2568b8ff1fd76b76ab50462c577bd677485d9c9b28776722c0ca102058bd6b58379
SHA5129a987929f6576c65f0e9d9b223d34c222e6efb3794e143fc2fbb175eed6b4256254302f207e822620ed39b7496aee3fd7b53eb23df0eb1d76f20d7acf10a08ca
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize5KB
MD55682430cadf4f360d7546faa4b877249
SHA1e81d7fead59fa5978a825c708442f599002534bb
SHA256a2e3a674a990ac02d857ba0dc94fecfee0d2296d9ebd1426370c7194ceb25e19
SHA51271fd442ce7b86e32ae1f6cb3aedbe5464a74d8bf0323f30994a4431936c016a11ff6f00c8cd5354c225cf1adef88bb4255892cfb2e04f4c4c94bf9cc86e386d5
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize6KB
MD577a8083ba068a7d08891af204c5c6c99
SHA1ec688dc14ecd09d40ca3b7940c9bbb8ec7127aa7
SHA2562985b35394e9a061d23f9e022481f24b786089eae706c63169e826580737d012
SHA512e6ff8c3b2bbf9d83d240db62ffaab5bf2276ae6c80210b17b6187cda2ba61b66369378623bd9b6eb27cb7f375c731497e788366bb07a9195a5a35130e3afa039
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize5KB
MD5e7e5ca20863eb11f2919405efe68a6a6
SHA1d5cb3bcf5109466eaaa4df3e683c22a4f2f6f683
SHA256fe7705d143bea50b3af8b8c69fecc7963f99df0774b84e4c752fd77505d5cb44
SHA512e4554c5af34b414dbf101446cc412e8f199d738c882bd37babbda08afbf3d386109a09df3b6b3130364e191bd8d7444b980e0430ad1d73ee86028aa135067d38
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize6KB
MD57e2b39332c16dbc0e3adcc7f6ba8855e
SHA125ece68c5e5c553de13bb974be28c1749c12ed36
SHA2563b67a5583bafa42948abf6f44733619884d72c54c2e9ffeba81b6d00bdba113a
SHA5124a14d27d6cad80e1fc36ea8f027ff7b707c3df11fb61c3cbfc4177d7b9fc3aa3b432d78c232d8e5ae87a54855f32cf88baf53cd7af61a4c0faae22776c63cdb0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AD7399F0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize5KB
MD54ae4dc8772b19c135df09d571928257b
SHA18e2d7c488251ab690da9f0488d56b18b43cb580f
SHA2561be629e6884066790470f3f129098c8045cf9efabea656476793d60b59bc0630
SHA512bfdbcbaecd59919fb46632139f26ea6dc8cc56b5e22c241b54811f2c626d3da814e299ce220171f5633cd171c306999e964ffc77615148e5dfaee7b43b2d9d00
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCBA1A00-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD59c0c33c055d9cc8a15126d3912158408
SHA1368a6e9d515836c226efc9f5b507e307920cd13a
SHA2569cf6345b66d04c757b28d97af12fb92feb672c82d5f245bbe07dbfb2ff276fc1
SHA5121750cf02a298b5f03883c6e1d50c2ffd4bd2c5b03adacf7eaf189b99bf323747163ec78fbfdbc208896d40f9d737b2b3027abd976511a9b3827ad04878648b96
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCBA1A00-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD57a87e853fe16048c5ff95eb426561fcf
SHA190d88cdb4f407cf1c06a5c4a60774208ce242b2d
SHA2563860eacaebb3a56497f6e25860ca9c1fa5271ba78f9d33573fa096eccf348d8d
SHA5129c65a1c752cacd701605343e777f264eb19365ba93e54287912a96cb0e62bf3fc16223fb0802bc92edb8fa846dfcbe6dfe7f17ae8d81e3ae1e034c10e0ac00a3
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCBA1A00-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5ce94965abb81f9de9f55d9b757666bb7
SHA1f4c044adf194b9a6ce806cce021943ac63d6d384
SHA25622f9b6473ceb33255f05e0c72af5e6250aaa5a594c14b362a3a66d79a39a0c36
SHA51265a2407a1f93a3768a9dce4114d7f550472d020209b1de462c359ba54bcfc39aa626fe246a0c24cdfac5bd7879b9310ec291f5b47af18cb86bf0b777e7d5dd33
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD331A90-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5617cd4062af7b5acf8d606c0deaec519
SHA1428df6e02e57534128054b4a2ace292da62034f9
SHA256109b1bedf09e9d1c6c44dc3470b9a8d3a10322dad0dbba62e293bbf41645f5d4
SHA512bb2454647ea7ba590c7f7b676afd344eda6b395eea3daf373cef240003971eab26d2f281e94d69ccb66e16257b4920522f570df1b8aa2735b7a571bb42f34ccc
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD331A90-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD5c601c733a9367326f011e62ed44be618
SHA17c83808221cfe0cc88b0ec9c8efda9a0894dd6d0
SHA256f3f2c96f65beb7f578b49755942266b38ce5c0ac721ce39e94f29c4b2b83e091
SHA512cf2cb2083dcdc99b498f021bfe89abd251e7d3200d5a327e67f6b57702bfe724360152bdef7d02bbca50a342050d23b19fdf1d2a64c7de43a180f2b75b8ad0b6
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{022DA260-A1F4-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD58f1db1173c5a5589ea57fb160e9df412
SHA102fcaa292ec081a1fc2c7a62a8201e51806ef5f6
SHA2568dae1a718218f091bf213aede6e40e8863f937ddae52b7b386617c8849749831
SHA5122dbc6f8c4bf9aced283daa2aa07173bccdc3947465bdca0450ab37ea01c6f29c7ed20f76d07611e285f3cf1ec0db6798b38d3e13922108b9b27ad9f153c58c39
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BAE0DB70-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD59614e7b9d57638ffd3516567a35567f9
SHA1c8dfed42f92b0190d2ff138e5fe54e752f58b559
SHA2564a36f61fb79d32436ed7b71b4338d6a47ff4c1534df055111a8d6c644f791d37
SHA51296e218457737a3c20c62009a2b508f9fb8ed776fbbc0ccf1a4b0d7d434335f2caeb5081fc9721ee1bec4a47be55f17edf3c05cdbff226a0c8697e0ba87a6c68e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BAE0DB70-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD5be1c5785ffe0fa9fd14696a9aad74aba
SHA10aedaeb45df4eb94a19902ba66a21f1999cd73fd
SHA256326095325bb6c5b78413a1f4c6574216aefeb3b773f6a6992230cd963c0cd797
SHA5125b0c96815cb952685e8c699ec8730df6964248aec1b7179e471db7c1f71259f049ec77acb56e066b7ec805981b088328864d6abc45fac80d9f19b2e1176c29c2
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BAE0DB70-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize5KB
MD51a9a3c6d9052c375af8f1b937dd70fc1
SHA1c23457b462073a047d5d29d0c40d8fdfe0d86347
SHA2564d840a4f8b0aaaef213a48d1fbcdfd533600ff24371a20512f8f38e4da25eebd
SHA5120cfd82d616c2c54622c885e16f126e7983dae4894decc77ced6ef366462ba2ffd824cbe7eba4ea043c4e4e283cd3d13f750bf6e7d000bf88fb6a891068e298c1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BAE0DB70-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize5KB
MD5427bf7eb2340cf95855d3f46d591ff71
SHA16897d119fe13c486c562c0615325e30c4e5d43a9
SHA2562d3f5fdd3ffa1ab34bf6683de82c82be947198fa04e9f24bfe91af2a6babff0f
SHA51263f273829aa9909d3d1a9708fb0d07ddd9535d492c613a4e8a4619f1aa7c4bc796c8ea8ac2c9d130c877273654a52f30d2281d677ecc9a6e5ea81c40983de4c4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C28A4871-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5c4d30af1701fd5b7e5b25bc82ee0ec83
SHA1e7627dbfaae99dd115b8b62fbf443c6523d12d63
SHA2567450cbfdfd6cb866e0397ed6500f0f1a85de16120effb419ebd3ec99e2b3fabc
SHA51236fd0c34f83a760e11f021e543fabed759bd4cf31e9af40b16e68651ce599e917541803fc7a5a521787e13735e3d816911c266d9f031d1a12330d68d5b925a80
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C28A4871-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD587a8bad3971e02c61e526b8b4d5025d9
SHA12694c35fc8ccc300760d852dd93ddf08643c6d71
SHA2566aaf2b1c159434ac2f377c7b459bd2c4569eda0626a26d2f91107956f003394a
SHA5125ac6371ec7e3d5f54173375446c0c457c7eff8974acceadb2eab17d584a363e81203c24edbc003f1c9a1ca0934c702ef9d359da4156ab5d35a43b18e4817a9fa
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C28A4871-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD5954f380f8ad91f77ac261f3c0a5d0ccb
SHA14ff01b7707bb397126d791443b2ce2e9f0e77fa8
SHA256899a49ce0899ce7f5a83b6d4f052ea882b661b9fc865d3224605b112e02777c7
SHA5123a7020cf65867a61e91639a613a80a18f6be1d1a756b8b93c189b0de52c9bdacd71392be39fe173ed86ef4873e618f1ce85bf8dac80127b06a8586c7781a86b5
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746860-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD525af5dacdbaa55aa8bb999fc9a4fcff8
SHA19470cba9b032b3a781b9d53e79144489d0b4da81
SHA2568074fa6eb5c3fdd9fd41fc0393aea15d79a2c816fdabac09bfc9828cd5249434
SHA5125c9b164443b0aa8d8bcf24359c8fc8383e433c45b124d244006b449ac9061381656f91b9be05a0f90de0f56ea71e7b6e2e1fb6511519e777a355f3ccf3c745b9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746860-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD597d3c75079e6b374de53d25ec18b31f1
SHA188b992e7ea9a4564aa0a56f0a70378dfebdc175d
SHA2563173926d93dc19d8f7f805fe8ad2a5606b62a4fd18c7dc47741ebb90c69fd8cd
SHA512b903c4e6ee678a91075dc6e5ee3d077c9752860ad43730a82ebf8533279462d7749b5f5544d4301aec54c4ab0aac121bb64a9ac23dec5736e3564b20e167425e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746860-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD52288a269f4c212e31f8d95fad3d2bdcb
SHA12d84271d7cb36c7d690fa21288eb5d07d085eb82
SHA256553d56a390c8b63546520c73782d0b03d7c584be9acfc3995a5926d46560c9af
SHA512a21a6b8338cfdb8a52b57e904a5f7a318649ea4077e58928f60eae8b06e491affb1f625d0bf8248528871a12ef0747922e0cfb320b00983a01ea6bd542303915
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746861-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5727f71220351a86d2f4bc5630a823e7d
SHA1bb520d421bce92eb3551257bbbe1eaaf60fe4147
SHA256eabf7c95d1538911daffd80386c9b1973f78a4d78ce27d4ac81ed673324b1e6e
SHA512728df8ff4cbd9a97eb34637036f6192ee0043ac3555f20e85c1a5b063d1fbf9d28db04832f3e5c970bace0d92fc018b0cc0b89f7b4d13f4661f657ef5a03c679
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746861-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD5bb4a70280b2fc5582f4dbaf299d9bd83
SHA1c0cd5ce6d272abe4441c4bdeed631219a5b618e9
SHA256c7d1446ec5af649eb15097491269d957eb9ead97543dbdefbb8e90b38005c2ed
SHA51289f5a2fcb55ad87113966f3fb9c5301cd31df6b0452a09929c12cb5f2e614a79a7b06556f41cb9e903cbc8d03552b848c9773d84b354fddc7e5e65b21d61876a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746861-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD5c35fc427bc86557d8626e5fc78c5bf33
SHA176227d2f3900950c7e464bcf39a86a466b8feeab
SHA256eb2eeb355765e261b63fefb39fdfc82d24ed919ca831451bb55e268e00cd8a06
SHA5125db2c05ba819824ea28f3df3c95ccc0f3d6feef5553c6523934c4ab2d15ce1b26a8f7abe263128d37e7d06b8ecca7ea735f2001912ab4bb98c4a2ec055170b69
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746862-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5efff59ee78490bbe872d63a244bcd3fa
SHA1e66ebb42c24121b344742ecf3472eb386e683edf
SHA2561a8895d9ff302c6edaeeda375748025742bc75d9ecb5cf49461efc0cebc376ec
SHA512f7be9c2daf16b0b2f841d3a750960b21021bb2377fa4bd7701484c5ed26436175f32f7b303b50a9637d416c6b73901b9b468cde39f738a1739220a0e9d24aef3
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746862-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD59e58537ee1b69d74ca3a12705c76e444
SHA1d564dcc8689dd34a6efe5dfcc862919d81182af3
SHA2561ed638ba8839dcbec0100c49c7a5da7bbe8272dec5f622ad681d3fd58e7815a6
SHA512d9a3cac2f290c217ddefd75fb9eca0aa57cfea7b6127583d440c97bbaba56e07e24b6c57f9b43859963c3ce9af72dc5ac37218e005b424697e90108cd91960b3
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746862-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD59b269d7314e7222848ac7fd30d97ff9b
SHA12a8621faac1af1273b7b2ca7cab49216d6cc2cc4
SHA2561000a4168978a5a07f065bbdd07208f045061021e181317fe33952a15967c8e0
SHA51278b43e04e003369f4ad72013c5bde219ce069cc32339306110f7716c27b30d469f440bc3358bbaf31f1bcb1cb83c22f680c11792b77ffcc977af52cdc1ab7660
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746863-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD58882ccad00a0b38b360c733a6035aac6
SHA185b94384d8537004d72941511cf7e791a877d490
SHA256de42932c75ed45cc58c2e82998e201aacb4eec65feb5624aa53aad1837be7e8a
SHA512c7339507e8846ab1912023056eb33c0fe7470f7935fdd988df9ce01ad2febbe0f93094f4e4e78eb91a49347eebf39caa981147a472b72887cda61803b69593be
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746863-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5e4f4436764f230af18e8d7263d749bbb
SHA1214c0fe2324967b5a5cb811afa3ef275098e59c2
SHA256c9cbf79d570c39003c9aaad566d79b4e4e369d039c3e071c64cceebb452816e1
SHA512de83ff0cf863f5f058a3d17f2b69eb6df303eba97d36f4ee4b8e5683bd427ca2e8ce129b1cb77c482e9e81c3364515ceaab2d9758c8ec2332d0c67a1024f2c0e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DC746863-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5921c1b47b3a72ddccb39c994bda9df31
SHA10db8739529797fafe976768032f5d751f703f44d
SHA256de8a039abb7deb2cc6483c2dd727c9a168e4eecb4ba70abaef80c6a3f1c2b551
SHA512ed1745be5fd3d2610d3b9c2986f183c217a10465bf1f5bcc0f6638a7be22f1d791c7ad9f806ee2c83b26f1758141b4d0f4fa3212a2c7c3e46227c5dbbab5618f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EC085A70-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD55939f25134c2b525695d8b5da261a808
SHA1ecfb5ea883ac38b8d60d6a1127a1b8aa427c2169
SHA2568db42eb8534b7e3b04c1133827ceda060c418c74bbd0615442b842c89ca35f31
SHA51224cec4c29d569bb0aa52ffa13384995ac5e557dae99eb30dfc2a81b2a3b6370be006c698b0d06909f23d5d126a66f63538358561e8c4b184b0f101a97518bb0f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EC085A70-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD59651f5e4c2f7abfa64ee0eca721bc473
SHA1785f006a55feb9eed04c451ce0949f05497543a3
SHA2565bf3e4d3117b03c4c97580bb6578a765d226edf081f6cc5020979bb6a670dafa
SHA5125568f0868beb6fa160433cdc4b3b035db664293b75c99fcc97545ede602a9e1c9d0aaa8caf77325ac462c4b93c32984c9d37821240243244a9e69980847a078b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F9D6D690-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize3KB
MD554c18ce9ef7b571bcd1a1fffd6bd2264
SHA1f80a95fe1f99cc008f866c43d42a9902fcb19162
SHA256f48ec9ed53601c13bbd0a22be76aaaa13b962fa3a01fc9dc90779d37a0d061ba
SHA5125b72c58377cba9c6b51f8742d0d990686d4024faf2600b9fdaccc255204c047aadddc403cfa7f2f4726ddd40a2f6ef61143abd1ad1cbb6cc699b5eb214079b47
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F9D6D691-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD5d8771f2531abc98a8518ffba8df4536e
SHA1d305ea58c1b5117be13d35c4d7390650c05796f7
SHA2569f78903a7f07683f825d3d8ad3ff2798f2fa04e5a70a8830b898dd5d8af62989
SHA512e8f98efcceabe35c7d0521d5b1fe5a1bb378ea863dec926946e45cb0c8196d3b39f6b3387857c5b189432dfef5db7e0d85e7f342302a9347dea227e694eed9df
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FCF10EE0-A1F3-11EF-972C-F245C6AC432F}.dat
Filesize4KB
MD532b6ee4561e4d4eaf9e714d772b70f51
SHA158ec799d51962ffad55630a89ec8a6ee3bdd64a6
SHA256d393aeaa05b69ae44b5ac3d8b43541273706128ca5839121083c2532e4daa83d
SHA512ea49d285c74d09bc13fcdcf2e911b95d503a5863131c4ebb922b29a51d0b90f1b21178513d4ce15186553916c76d288ad27d7bd034e99255fc1e8e9a0ebf6cf7
-
Filesize
112B
MD5c8186299569367f9f03cca5a2ade290e
SHA158122639abcad45bab87355837bb34a3111a56dc
SHA25673c2a2255d1d8266f318275041a6cccbe5a44dfe5813977d5dbb530f597eb73e
SHA5129f3fcda0b8c7aa81857b323aaded2b48a3b598f34b5ad6836e8fe9c6f6c01e84eaa69dfe648d1741c320b8e3492c2d887f055bb9349f211b30224e1b2e95f46f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
317KB
MD5c23b825fad3e04e26af81ab53ba5f94a
SHA1024c688032998747ebc785c95cf1b9a7e4af39ea
SHA25605945eb05846c190ed7c9f97c26151ebabecb142d08788bf548b1eb798dd3124
SHA5128bea4091db10b18ff89c03fa39a60eff1bacf22171b1e12032e3fa41fefaa0bc109c50f1eb2162dfa16587ea4f6d596d1163c297b33ec0c1be319942b9b9adbb
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD555a26d7800446f1373056064c64c3ce8
SHA180256857e9a0a9c8897923b717f3435295a76002
SHA256904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8
SHA51204b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b
-
Filesize
96KB
MD5e96dad009437ca774035ffd73708bd3e
SHA1e8c60f196d5b703137fc0041256435d652485e64
SHA256761e39686f293694ebda3de5f4aca0faef72e45046093feae9cda442429e0932
SHA5121327f1360a26031a971827e3249f584367fd83cb10ba65a3bfadcbe04602459a1ab030eab12800e1be45173e518fdd2c6517ddd865150bcd0eac0c8965775d8b
-
Filesize
16KB
MD5aca467cf06d8b1d54e52d12377d33558
SHA1fc353093782b0cce7624c76efa8e5e197a24e04b
SHA256cb30cefb9c783f2f38af2689fefd3fd73520bcd8a306fe0a6adc347684969eb8
SHA512ed8c69cf2e18f8ec2144bb360c32e8ab464bc5be52be3d04f4070509ef5e277304cd3917e535409fb6b0ee81d936950ff4953a9ddf24cef3c5b38cc5be722364
-
Filesize
2KB
MD5ddd2b75c05672e689ef8a9379f48a987
SHA1f643ad00a58904e4a2bb6d8579bda84c012031d7
SHA2567417d8de1b37a02b7082872f3726627993210b2c1244a54d4e95d8120e1055a6
SHA512eb84ef12c39535a83b8548831c21449c9358f1c82ec6b2d96c471b492e340a90f9ddd2d0f56306d54bf29fd4d289f216eccc9e8750c2001aeaf4f166226066c2
-
Filesize
48KB
MD57a1b67ac75846585708c628a2dd05a7b
SHA16a27bdd6b622e9a9ac0a60668cd1c0be28fcfcb8
SHA256d8239ccc8dbcf56b1af20e0c6c4ca0b46a908dceb351ad30c57a4350cb0d9e99
SHA512c69d01d08016c6dcd83bc3e646a440a32705e88d21736b296e2ced2dcb3b916617461e83f3818f2fa4361269781b240508e41c88bff230f4108e1b87c5e21c57
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K069FO9K3IBR86XAQNO3.temp
Filesize4KB
MD540f389bc51600ba056d3ef996268507c
SHA198f7e803b281aaedb45ea3193fcda0f5986d64e5
SHA25619ace4e4e9541c7bf0d7060c98d1bae12721a8688bcdd6281154ed1e31c08fa4
SHA5121095d416f7e9ca999a1b9a4f16e685f6a63dffca452589d786fd6f6c632ad8e700901dca9c46612c320fdcd64e7cbddcba474041390f84c60178d94ba0aa723f
-
Filesize
216KB
MD51c98ed44445e192ccfe9709c0267f96b
SHA171eb65b3422f1299198419ec962f0606e8081feb
SHA256bae1ff6cff01d4afe6878036ae3ae40126fe4e5851e0943a57739d52f489e01a
SHA5123f781d3fce9fa1fb4f9aa544754904a99ec56167fdeca779de8c14ec359aef50135a16365fd697a4158f71c052830b49a471208bf4c9448ed631fdaf438f4092
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.MSIL.Generic-b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468.exe
Filesize394KB
MD5c645156439e9ab3a043e88bfc4e7646c
SHA189f77d9279fab31d6b88dea25e86f72c868fb3f7
SHA256b2285790c15dc134d3b2556bbbadfa8a5a66b169a565545f62d23043433e2468
SHA51293711e45dde15059f7f95eb51733f2431a3b4023a76dc3ec5b39f97186a789a8ab0b805deb2a3824dc94257495c351ddbe7bfa6eaf5aa38f715ee0054a6b6e9a
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Agent.gen-d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a.exe
Filesize277KB
MD51e2e5d8a1f9261586ebe65860a1acad1
SHA105700516eeef80128eaa18f759c1e007627dbf9a
SHA256d6e35e20d5b7fa3d0b5352b4953701cabb4ed2a83d94dc666ef9900b7c53394a
SHA512cbaa26348482cd6dc8c8e8351b2df22325e873759532d17816f06e90cbcda9be73337587d7ee7011dd0113d606fb609830a4e84f3999d86541c3920d904ac01d
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Agent.gen-f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760.exe
Filesize487KB
MD5b1ac841260396852155987631e67a56d
SHA123624cfe3573f72f40c78f32d0f8b7455257854c
SHA256f7d000fad48f47b3b9122542e05244b8a6d448b502c9018aec5ad292fcbe8760
SHA512e465d49b45ae742f70a3130918ff2d1534bb7786fdd0ba17b7f0679eb7370f13ee3495a814f47de59b8a1e0dc45c4d03376d6ee82b5d0ff4f2cd1075c32a6f53
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-07f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0.exe
Filesize134KB
MD5ba32fac7630b66e8bcd9a68f1565504b
SHA17fce833ee78c94693e21a45d8f4cfa960ddb47e7
SHA25607f90d6793aeb953617a06980862921295b830a27b616cf6bc42fa02b00bd8c0
SHA51298acf94d0c01109d609adfcc9a1eae0c56ab22f6dc0b58172a5757e5cba3171746afa2441f216221eafa3bb0c5ad1269623e4a3f2f1a5c60444752b277c60ab9
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-8838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c.exe
Filesize139KB
MD5a733beef6f383b9c626bba0dfe0b0450
SHA1d7f08ddf7253c2433edb4cb663202e902964a43d
SHA2568838aa8f412eef436c63cfe501c868a5433969fcd6fe2b571a11dcabbc38839c
SHA5120672b86b41b925ee91881a7c24c02e756c827199a0e06d6bbc51990091fcb6b7e2345e6a34a2e2693b5a106cd465b41136930ab78514799997fa45c77dd171d7
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Generic-ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b.exe
Filesize189KB
MD57f20b566c295cb058b55f69a49d0d83c
SHA12f53999c8d41c62be58e4d067f18945edf4e1ff9
SHA256ed84a7185bd3decfe9104fa3f6dad24bb0a0ff27a1a792a05ef0f2b010bf7b9b
SHA5120d51a4aa18203e9ab34c3ee66a70109d70bd36a2a3ecfa36886d4463532f2121153250c10f230b1314b2c519b4f1d40d103ff590c5d076cc9730247878dd64c8
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Locky.vho-65ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e.exe
Filesize517KB
MD53b0d88e51bf8a7043c8aeb6d30fa3350
SHA1979ee35242d0949f32672336c9152504703183e7
SHA25665ef86f0fb512270b3214bbdd9da2aacba8b84d8b80fec6694bd47dc5ff4346e
SHA51253b2e82f792988d450082928e769e63ac6611140e8c927c1152660c1e2a4996c4e4a86b3fa44332c085e99c23c21fa3cdf9a929110bebc088cfddf18b1fe53eb
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Shade.gen-f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5.exe
Filesize232KB
MD545dd0f822e034f1813ea762823ada4b4
SHA1b4b55a1daddf784e2fa54e56f8f5c28745a4b290
SHA256f01e60b97574b919067bcee155496d87f9a594e3fc10999dec998e0a114349f5
SHA5122b0479797a52a6b0520c07f615b867b1478e5f3753dc0fc3c119f72a9aa79126207d263c24610c90abf8342ef062b4df64de9b910f2588635366a79c59c20633
-
C:\Users\Admin\Desktop\00300\HEUR-Trojan-Ransom.Win32.Zerber.gen-c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18.exe
Filesize396KB
MD5476f48193f5e56bef170ce7f237b781c
SHA173f49660347539b1aeaad32c99d9f6d927da73d6
SHA256c40785135751df957b18fe5c0cb85309d07086bf325dfd3635ef0d24e5b19d18
SHA5124c09e38bd051316eccb4c0c55ff903b5adc31155dc9cc5be4c21a9e4173ae0d12e05d6b15716cfea0563223ab9cdb6252a31c378a54f178f83972482e4329187
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.NSIS.Onion.qeu-fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768.exe
Filesize114KB
MD5e2949fda7d22d37c04c159c58219db7a
SHA1e37bffd19eb59e02c8d483103b700a30224dbe2d
SHA256fac2a55288f5599494534e62f18a28dfb4311562fd6986f0c8df67b7b1d6b768
SHA512af23eb31e5f8214edd70927015ea66a05217da509043dfbf2e869506883f67779b5c78a5246d0c43d50c453b89a5b173c3cbb3645c0daf6e3403f3d603566fdd
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.BadRabbit.e-630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da.exe
Filesize431KB
MD5fbbdc39af1139aebba4da004475e8839
SHA1de5c8d858e6e41da715dca1c019df0bfb92d32c0
SHA256630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
SHA51274eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.acku-95e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328.exe
Filesize328KB
MD5ad99744b03d49d57db7a1d882753336b
SHA17f1bbc2d16f2ffe142a167b2154a6395d22650f4
SHA25695e36cbc4da84536d810aa22ddb6768688c7883065b3e17c946ca80c5ad4d328
SHA512fd4a0927b79c488a32d702aa77a0be386d9565ab26eafbb6c16942dc52349db14a3b355c81fda107f8119f886e44662373e79e64efdd7f955c19296750cc0068
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.aerw-99d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3.exe
Filesize316KB
MD59e1f7d4eded2b08c003650ace9fc3a7b
SHA12795600759060cf55ea6d903f79d7a332b9c3411
SHA25699d41e3e130b1209dc802bc94fc7c6af023ffecaa40358dac4d57f2f9f4b42f3
SHA512f0e31ede68901e6c8f24f452acd6c758941e883a7475d9eb1dd274af91f20636df82579135019c72a5c37ba21fd09e47074cb3e1a6ab062d2c88412ae5fb5752
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.juo-de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54.exe
Filesize368KB
MD5a829b4ce4529e2955e369402ca502298
SHA1b3aec6248fa938e2a58d3f039377b44d05a8a945
SHA256de0882737c9f77c79c5618f955616ca43782b2d0041e424b06cccedb2e72be54
SHA512062d2cc89d64f0df84fd7398c7863d8105865695d19cbe9a683f2d14a5401826c0ae811a425a7055f149501301e03fca98e5a9f368aa60beafb43e2ab245b942
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.kba-d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915.exe
Filesize372KB
MD598123b80d89e6418b7d77ba8be8b6a50
SHA1e64279b40062d404600eb3d901358c532f2aa3bd
SHA256d27df86a574f9e5e3f6b0a6ffd180da3c8d46e3ee94ea65eff4d1e782be9a915
SHA5124209f8a07d207c3cfe2ffed8a5d909a66fbafdc0d0ff6f27d6d92b96c9f2eb625d7dc03f46ced2934ba314134f1cdb59df5d2e01e0f55f5a2ba0874ae31484c5
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.kmm-52a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb.exe
Filesize392KB
MD5e54eef0b1a3f4c6d7bf5bff137ee6eee
SHA1d4848dcbaa6f25b877a4573d779cea4451c004ad
SHA25652a6bc011e4c7c6bd623df1b25051609b47a5c60f4d9e21ceaaec05f8ad6c4cb
SHA512fa093041180e1a7cbdc7690f3c9b303933a9b20a2759e6df51b951eedfd725b6f3ff9480d0ec97a0fed3376540cce2bb9dc99037f4db14e3a34ba06c0acd6c2a
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.lfc-e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176.exe
Filesize388KB
MD57a3237dba04641433fd3d63dd36678bf
SHA1b2f9a9fcda6c3774634dd08517a1e8d508e3e263
SHA256e249d7a44eda860d9c7f294096fc432f7c5bff3c7fbffc023d303b16cef81176
SHA512b26552cdd9dcb4bad1a2d39d00550ff1f06e8382078aeb6f6485b92a0d5f5fadc13c6e39d7cb083b691b44ceb53292471588d2853b7c869263521945a0f6e4d3
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.nws-c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e.exe
Filesize608KB
MD517b69de5712d9ba3fb9f25747193f93b
SHA1ed8806114c7160a05d30eb7ff15076781598bd75
SHA256c26cfef66ca21ea663291a338f2306951b23bf15827b90bd10d28f22bd5c9c5e
SHA512a8ffc80ee3f7189a487501dde2a692795e47c16fedaaf762e9fd308d5dd218f135d0296507789327bf5e9f7cce1b74f08d8c8195537aaf47df76bd482015bbb5
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.pre-6e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb.exe
Filesize285KB
MD528efcb80dbe1c0c14ac9ef1a85942755
SHA1b03bad59da5102cf0da95940badb304292fa6417
SHA2566e7c24727b20f2a1a79bb3ccc41493eed829ef79976310030d714bec8b15fbcb
SHA5122c25f12cb053f1746159a9e459c80d2965b612e1808e7542e0d1953f7b6c6e5ea4d1a3b4a87c54356c819e62825b8107387a10b13c8c931a764dc9cab065bf6c
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.qkb-0509dc1e220ace6698b2df8246210e750659cdc00a1926024342727d7a4d599e.exe
Filesize484KB
MD59a665d902a8ca246c3569c977b522942
SHA19b97a369ccf19bfab60e2c2d0f06f702df6ad9a6
SHA2560509dc1e220ace6698b2df8246210e750659cdc00a1926024342727d7a4d599e
SHA5125a65f0308a18120f24e9e9692083173c669c8a203534c3c57d4b6f7ebf90bdc6f4bc1338105cf1307739a332c16751131cc99cac880ad7da877f8853e3b41ae3
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Bitman.ue-794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053.exe
Filesize545KB
MD5d1994fa34f9a076e0020417b7f723447
SHA14334541035e6c1bd6abe98bdcf056aea6618e324
SHA256794cc0a6f34528e914db6c31defd2b14f38e6d4d281b7b5725f5d7aa18299053
SHA51286c044ea97a44d7506bdae8e7b5dddb93d24621ad28d061fcf76115b8e4af79e3de5f4af02bf89ee9497fe3eedafe8ee6c46c99c736d5a4ce3ca4a2132d2fd6f
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Blocker.meia-57c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057.exe
Filesize63KB
MD53594613ff1bb8307d4f7dd0de84c5169
SHA19243924865d32c720b00f1a4f9de9fa2543d8294
SHA25657c58acac2c3dc6f92cda36758a042015808674df4f3bfaf3b53044afa433057
SHA512fcef5783a204f4351f528e60d120f1152f65cd89b5ff39fc31859d9a587a0370fc749a9d824d22048ce18e4e8fbed5b6e065d954de1dabe57b60ca8db06bef6d
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.ggoa-43356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec.exe
Filesize80KB
MD5a271608588c6b445a6e7607ce8833a54
SHA174c0bfae783fc60394ac93767d8d4cfc99fef956
SHA25643356fa28c91f759cd21038566d2404cefdb94f27c6b877b41173bc17080afec
SHA5126da247f6ec79b3465d1d6e01532650ff4319064709052001cbe9f57e8ea869f0ee160ea64170d8d24f9cded44c78085f4ab94fb7b7ddbd23ed11a88a97f973e8
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.ljru-471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916.exe
Filesize141KB
MD5c6d49ccb48b3c4a30c26698a8f1d076e
SHA14f984e192f81810cc396ce679ebfe333d2634093
SHA256471b672db91c19b8d71e61d2760303ad1b7e16b47a631b573e46bb5a775e7916
SHA5120b1a7e8be1670581f8b2fad1c6dd494bd38dc9cf953e9b22ca15f85de9479edc6d1ef2ab7b4d5a1a4947d1353d0a53c40d986d4664c34aba12b83300f53480de
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.nonl-a6c25448cd8f87757636d291d26abb80a290d5c731cd681ba1e4f315ecfc269c.exe
Filesize565KB
MD513a1c678df7989f75a1e8bc38c821e69
SHA14c4cb3a360c21ca64c2f3c3fb2e7df074be18d43
SHA256a6c25448cd8f87757636d291d26abb80a290d5c731cd681ba1e4f315ecfc269c
SHA5124e998770713924ddb7d74632442147efc86ee72a22a9274009d286322c5376e4ed020a3911fd7ca7fe0c2f301084d31d2c18b703cebcc58ebed3997233c52629
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Foreign.npcc-b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b.exe
Filesize345KB
MD59065912bbea0ff5dd18d10d0b2f40789
SHA1a968efc708bbd99e70444e532efe16f8bfd0d667
SHA256b939eae084920a1b19cdb837b759c229ee96e1ce4aee8e2650d1a7c8c6defe4b
SHA5123faba95b525a0e87e5ae5ccfccbcaa0773ffa210561a137f0dd650b5d82eada5ae67877b068b51e15bbb132bef02dae75ce5d35a4e0617ca06bceb4db1def4e5
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Gen.fqz-32daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35.exe
Filesize875KB
MD5c72f365489a11b5426bd64ca6947476b
SHA12d13343d0fb13febaf2d923f1f6980c00e53fd62
SHA25632daab62cd25eafa980c7ad6bff854d2cd214ae1a185fa3a9549e6be655d1f35
SHA512509f5d111afc75e00561d3192c1daaed7e430722ca6357a3ca775788862b18a5c151b5650275c8cbdca0f3f00a81d7e62638feff5295b54639122770848d8b8a
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.abeb-c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3.exe
Filesize625KB
MD51934bc240ae9e8e101490a9dab13c079
SHA1a0218048aaca34259d0651d911b81f9f12a30326
SHA256c2e56510866a6e038ac723a3e5a2ac66b14f407b91886077727f622f561164e3
SHA512c7f3c47a2be2be14387f762164db8b4d097cddd1f72efa0e81e59379b1e44cb7f71b56c05920ecbadc6662c58d9bb84d2c8dd4ffae9ecbae67bf0d8978a8a5d5
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.abfp-1d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6.exe
Filesize634KB
MD5c77d1c0c0ecd0b2f81f2bcf89fb07279
SHA1be7d13c25052903d150ed07e836e210e298b9995
SHA2561d4a3957a4f4d83f1edffcb0b596e04d98c82f801ae4b23208a34076203f42f6
SHA512a967039c4a9804b3ff51c25fafa93322f983eaa52fe4361cae3f5a54c02eafc0bea8e848a3e94ba17e09622b53466dabef14c1a775f0958f06c6aa8e70b9e091
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.abgv-cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39.exe
Filesize617KB
MD5faae3272bf42590aec32b4850ee6c028
SHA197158cc14fef44a679bbfc3ef8188ddf31877e94
SHA256cfa555527bae829733f72c3c04fe74eef0ed196cd00d2a2e2ee92a987503dc39
SHA512a8bc114802ae7dcdac9dc00c5d8ba1458a3493f863215f84057576edf1017827d1c4a7b9d2e053f657c0c81bc252b95cb77f07f0ec681ae68ad8b1f891c10597
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.afiy-4880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235.exe
Filesize589KB
MD5efa1f0d185be2de61aa7ca2c76c1b371
SHA1ed3f3c3db91f5992155df7fe02749297c4ed575a
SHA2564880ec5ee1b15232a6631dd80cc4d766ed62c3bf54f54bc32d2bcb0d593e1235
SHA5125828e689f7e0d3083fa91d06d268531e9dc146c3531d0aa77b7f4b81738a618a8102702e62fdef05f29966ae8aca7d61066703349fbbfefb7d83e2d6454d16b2
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.bil-6f1b3c48f263289c8de3ea1bf4b173feaa502db8ed84f4943f4a049071084aee.exe
Filesize244KB
MD5319b6b6b5fbc5a01d333ae770ea551a9
SHA1dfe2cf1f67cd7f0f090f400444b69261305e63be
SHA2566f1b3c48f263289c8de3ea1bf4b173feaa502db8ed84f4943f4a049071084aee
SHA512775fae93e92e5ad1e648f1151717df0dfae822dde5446b4f8a2a9dc33f115557ef91235737432377d2bfc9bce840b89bb9c4f52aae8a46ab0af932e34d0c45f8
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.dl-e9990ccae658bcecca6a7b52251ef55b3298d9f46c55e92dea0363398b7d6c41.exe
Filesize192KB
MD5b1c957ab802f39839f2b92d7d55e7f83
SHA1cc109d0fea1b0c13280203ca8972bda909c6dde4
SHA256e9990ccae658bcecca6a7b52251ef55b3298d9f46c55e92dea0363398b7d6c41
SHA512750f180a65b14591f3962be2f86dad8e5301de681aea992ceb6bc2635b2727a0d628400b36d5235107c74782ab25af0c565f35d51d54d26fabeb355232cb43a5
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Locky.zmi-f8e7dde2601ebeb7e30af4c54016223f1c42298176e1f2f5c4945ca6b8b88317.exe
Filesize645KB
MD543e9190f8f18e52dc361f775cc02b2ce
SHA1523d4fe97f74759f5b917bb8ef4982a4011bf8c1
SHA256f8e7dde2601ebeb7e30af4c54016223f1c42298176e1f2f5c4945ca6b8b88317
SHA512d586b9f313fb10703e680ce018bbd109dca8ea0211ffaf5c174639df38549f5acefcf08e6fe0766387f56bf307ed3bf85446b02a8459bd34cffe050075c7031b
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Purgen.rd-2138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91.exe
Filesize232KB
MD506518590d25945c439c56c99d486bc2c
SHA13af18804d7aba4a1c7cbdf859df73be35755905b
SHA2562138058fcd95620d254930f3d3df8def00ce8b696491b115635bcbd5fc8a2b91
SHA51205d96b1f7ab3453a7e6b14c5431a3237c4224c5bcc1020ba39b3dbcfbe3f37d2e84ad7ab54b0bafe362d1902484ccf9f16b362d0024347e156cfba1f96c8ea04
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.SageCrypt.dze-ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963.exe
Filesize780KB
MD54c63b758d8cd295eefcb38dc336ac288
SHA19a09f872447613b8c5fda3fa4ed99098a59c7b05
SHA256ffb3ff1308d4ec8ef1f9c949cb508926aafd1fa63ad86890dd420836bd614963
SHA512e996eeb41799c8718aa8441423485e3735f80a8477bce2fdc5a066f1e7fb1d10bec58bd8635f9cb4b9f5817147195147fee07d61c79315a8098731712477859a
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Shade.nyw-2d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658.exe
Filesize897KB
MD5e944ea7b6b608b16832c239ca99c5e61
SHA1ecc87e992c8f7bd25e48fbd9dd2d71096930ac6c
SHA2562d19fa4ce090239534ab152bdf941674d41e6fc532d95103a664c73cf085c658
SHA5125353de1c200b51c17f7eea6b847cab639b642908931798b93f0faa0ff61b9f30b5326e4ffcbf5b142777add28b4e16906a0f32ac622344eba7fd111ee0830fe3
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.c-96ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395.exe
Filesize800KB
MD57a3ddd634eea691850376105fb629318
SHA11a325a53ff6b3ce5c90874815a89f89b10114227
SHA25696ced32b262d8805a5cf748ae1c9d7bf03bd4896cf349153886bc020f430f395
SHA51287d4d6f914cc6c39c68111066489f558f8ae810ec10f35d8790fbb20938ec384022f0c41a4f0dbc230ea25495473fa5830c518ed8fd362a86bdfecb2058a0ea3
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.m-0a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7.exe
Filesize3.6MB
MD5d942c9dc7662f5550883a86660545dd9
SHA19f1382a04a27a6d92ede09b1231443e7db1f36bd
SHA2560a00aa4c6f60e7d2f19da6d9f6aaca1119541f7cd15a340eb03fccc341cbf5c7
SHA5121b434c8e3dbcbec9369271a722977ce6458020f9a730d4088be67d170e7798f8d291b2fa01e8d238b11a3910df990b1644637ec888c7f9bb0a79af486729e484
-
C:\Users\Admin\Desktop\00300\Trojan-Ransom.Win32.Wanna.zbu-0b824f863d1cbe4fcc403bbef23aaa27197d7998911f30845f0a75b5c7287949.exe
Filesize3.4MB
MD554880a105eb4bafeec08b7029213e871
SHA1f68813458ae09fdbd6e946e767305b462ad79f22
SHA2560b824f863d1cbe4fcc403bbef23aaa27197d7998911f30845f0a75b5c7287949
SHA51284694551292eba3dbc07020bc6e147799114c67c4c23097a713a12f34cb59e59daaed46e8578a6abcbfe3496c671d9f523700e49d750d9d5af4045944b6b48f8
-
Filesize
3.3MB
MD55962d276c44d0c1c522d4013ff9b2460
SHA11ffdd4b9b3c0e9e0412ff2b413d6ec05b09e2733
SHA2568919fc65032f804118cea725e5dbc25fcc9453a52ef6621a7eebb55fb559965d
SHA512cd1f2c24bd3463920a58955df3a66fae9070085770d6b0f925df660d48d931addb9f715b8137d53360519aad911ca40a5a8495902699afc9cfc4ddcd946b3d53
-
Filesize
4KB
MD534a9e6e0387ed47b3cfab60f65bcfbc0
SHA1fef0464ba8f68af46a19677bec388cf16ad7a34f
SHA256a5882c672bf072da2789b640cea1036e902e35815fecb2bc87d742690ff7384f
SHA512c7126d7fe06e9c3de533bbbfde6ea2222879b3c0b7d33f56879538e3a7e87e4a598595b5ea05ddf040d86fb1d6c7eea3714e3366b89a42c4470aed36c69f90f5
-
Filesize
8KB
MD59f354e4c8914afe3654b9e7ce3a5d0a5
SHA100c56ba0d10b6290305a49a06416ca289e0e6740
SHA256f4fc2f980e80de8313f6ccfbfc16f7e4efe80b6e443d19ce3ea4bcc571f0c1a6
SHA51247bbd726c9cbdafc95d4d923900ab87ceb74dc545f8d864e1b9b38727e551c80c9c74eb02e1d8b49a92ec520f3dad1f8a96f3e3635b0662d646772506168f912
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a