Analysis
-
max time kernel
119s -
max time network
323s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00291.7z
Resource
win7-20241010-en
General
-
Target
RNSM00291.7z
-
Size
16.4MB
-
MD5
175a2ddac15fa0d6d65b9d7ff0a14bb3
-
SHA1
6aef3b2af90218f68b1908fc23341bfb47688b4f
-
SHA256
a6009358e5e3d3e091c66e8647af92f2c063720ec98b35246b60d35894ef1eda
-
SHA512
166a3c9d33f4fea2820d49db1a9a7adb34949610036f7e178bc369e2398cd5c4eaf8b7d39b3db5c41508268861c90a9410f20acd38abfcc5337d8306337eae34
-
SSDEEP
393216:x+xT7w8JKZ2d8b9Hwi1F7oHOBu4m9Z9lt3gCuLYI:A97w8MZuAlHhAOUNt3Hq
Malware Config
Extracted
gozi
Extracted
C:\Users\Public\Videos\how_to_back_files.html
class="mark">[email protected]</span>
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+vvnox.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/229B45C26DC9B9
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/229B45C26DC9B9
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/229B45C26DC9B9
http://xlowfznrg4wf7dli.ONION/229B45C26DC9B9
Extracted
C:\Users\Admin\Documents\save_your_files.html
Extracted
C:\Users\Public\Documents\_READ_THI$_FILE_95D5_.hta
cerber
Extracted
C:\Users\Public\Documents\_READ_THI$_FILE_HPGM_.txt
http://p27dokhpz2n7nvgr.onion/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1hpvzl.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1pglcs.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1cewld.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1js3tl.top/F26E-3268-3C90-0446-9BDB
http://p27dokhpz2n7nvgr.1ajohk.top/F26E-3268-3C90-0446-9BDB
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\_RECOVERY_+jejhg.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/2C51B9E8D8684675
http://tes543berda73i48fsdfsd.keratadze.at/2C51B9E8D8684675
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2C51B9E8D8684675
http://xlowfznrg4wf7dli.ONION/2C51B9E8D8684675
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RECOVER+eihxu.TXT
http://akdfrefdkm45tf33fsdfsdf.yamenswash.com/2C51B9E8D8684675
http://p4fhmjnsdfbm4w4fdsc.avowvoice.com/2C51B9E8D8684675
http://nn54djhfnrnm4dnjnerfsd.replylaten.at/2C51B9E8D8684675
http://fwgrhsao3aoml7ej.onion/2C51B9E8D8684675
Extracted
C:\Users\Public\Recorded TV\Sample Media\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.asd3r3.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.azwsxe.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.adevf4.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.xtrvb4.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.werti4.win/E99A-5580-A36F-0063-7AE4
http://cerberhhyed5frqa.onion/E99A-5580-A36F-0063-7AE4
Extracted
C:\Users\Public\Recorded TV\Sample Media\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Gozi family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2088 mshta.exe 116 -
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exe = "0" Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe -
Contacts a large (25451) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3452 bcdedit.exe 3364 bcdedit.exe -
Renames multiple (104) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (713) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\winrs.exe\"" Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Active Setup\Installed Components Explorer.EXE -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2292 netsh.exe 1448 netsh.exe 2996 netsh.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\winrs.lnk Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\verifier.lnk Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe -
Executes dropped EXE 64 IoCs
pid Process 2700 HEUR-Trojan-Ransom.MSIL.Crypren.gen-d10641bf82beae9ab02073e8e1c8b293bac836fb37b81b07e4725da010bebbb8.exe 1444 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2928 HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe 1280 HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe 1608 HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe 316 HEUR-Trojan-Ransom.Win32.Zerber.pef-0eff1fb1a0c9d0dc59cf909f1f931756e57e9af39a844340b247c69fc971b614.exe 2984 Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe 1032 HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe 632 HEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exe 1936 HEUR-Trojan-Ransom.Win32.Zerber.vho-a977765a568fbabd5b00635cb7d58863154c32b50dce5a78e23428a5f721932a.exe 3012 Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe 2728 Trojan-Ransom.Win32.Agent.iyo-4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79.exe 2216 Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe 2148 Trojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exe 2156 Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe 2188 Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe 2172 Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe 1528 Trojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exe 2340 Trojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exe 1996 Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe 1376 Trojan-Ransom.Win32.Locky.bil-ada2164654315680132754a7063d2b94428d9101f302ff2a90dba6ab8ebd82b9.exe 2464 Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe 2488 Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe 1940 Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe 768 Trojan-Ransom.Win32.Shade.nbv-69ba6ee95db4f02439a183c4d3f9dae71b9b0a4071c82076486573b446b38922.exe 2144 Trojan-Ransom.Win32.Shade.ndg-a6471b8ea3b85c148a224157126c0ea3db8e803af5f93daa7deb4d63afc38d90.exe 2020 Trojan-Ransom.Win32.Shade.nep-ae1f435b9f0a0bbfc9cd2659520ba98b6a29d5961d142e4b36ba537583596b36.exe 3068 Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe 1432 Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe 320 Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe 836 Trojan-Ransom.Win32.Locky.ai-7d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142.exe 1532 Trojan-Ransom.Win32.Locky.ex-891c9e5f09c94e1dd4ca1eed54c828a9c0f84c9ccfdede6856fa507d684a1293.exe 1124 Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe 1256 Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe 912 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe 2580 Trojan-Ransom.Win32.Shade.ncm-0be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a.exe 1536 Trojan-Ransom.Win32.Shade.ndl-bcdbaf591fdaea9cf391c369b626a2d73a458759686db76e9b3ce857458eefb4.exe 292 Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe 2308 Trojan-Ransom.Win32.Wanna.zbu-2d80b45f96384837870a4f1c07a24b2bbecce0c17b7c4861f2bbc44ea64e9415.exe 2936 Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe 2792 Trojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exe 2252 svchost.exe 2888 Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe 2880 Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe 2764 Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe 2760 Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe 2656 UDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exe 2660 Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe 2972 UDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exe 1668 Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 1796 HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe 2100 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe 2768 Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe 2528 Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe 1880 ddacabfcdbhi.exe 2168 Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe 2916 winrs.exe 1576 Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe 1752 Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe 1448 winlogonupdater.exe 2644 verifier.exe 2220 HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe 1704 pgoqahqwnyof.exe -
Loads dropped DLL 58 IoCs
pid Process 836 Trojan-Ransom.Win32.Locky.ai-7d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142.exe 836 Trojan-Ransom.Win32.Locky.ai-7d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142.exe 756 WerFault.exe 756 WerFault.exe 756 WerFault.exe 1444 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2760 Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe 1996 Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe 1032 HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe 2656 UDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exe 2656 UDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exe 2656 UDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exe 2488 Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe 632 HEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exe 2984 Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe 2984 Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe 1608 HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe 2984 Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe 2880 Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe 2660 Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe 320 Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe 756 WerFault.exe 2936 Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe 2972 UDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exe 912 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe 3012 Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe 3012 Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe 3012 Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe 3220 WerFault.exe 3220 WerFault.exe 3220 WerFault.exe 3220 WerFault.exe 3220 WerFault.exe 3220 WerFault.exe 3220 WerFault.exe 3504 MsiExec.exe 3504 MsiExec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 2156 Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe 2896 MsiExec.exe 2896 MsiExec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 3708 msiexec.exe 208 Setup.exe 208 Setup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.96.168.183 Destination IP 37.187.0.40 Destination IP 178.17.170.133 Destination IP 185.14.29.140 Destination IP 178.63.145.236 Destination IP 108.61.40.140 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\SpyNet\SpyNetReporting = "0" Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exe = "0" Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe -
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\winrs = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\winrs.exe\"" Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\verifier = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\verifier = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\catsclnt = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Comrenum\\C_G1ring.exe" Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\sqvorag = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\pgoqahqwnyof.exe" pgoqahqwnyof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\Desktop\\00291\\HEUR-Trojan-Ransom.MSIL.Crypren.gen-d10641bf82beae9ab02073e8e1c8b293bac836fb37b81b07e4725da010bebbb8.exe" HEUR-Trojan-Ransom.MSIL.Crypren.gen-d10641bf82beae9ab02073e8e1c8b293bac836fb37b81b07e4725da010bebbb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" Trojan-Ransom.Win32.Shade.ndg-a6471b8ea3b85c148a224157126c0ea3db8e803af5f93daa7deb4d63afc38d90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Update Bluetooth Support Service = "C:\\Users\\Admin\\AppData\\Local\\WBUT\\winlogonupdater.exe" Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\rlanivnkxgxv = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\eqisnckqgbrf.exe\"" eqisnckqgbrf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\winrs = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\winrs.exe\"" Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\fqrquisibgrt = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\tkupdnxwwkky.exe\"" tkupdnxwwkky.exe -
pid Process 3920 powershell.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Libraries\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Music\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Links\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Videos\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini Explorer.EXE File opened for modification C:\Users\Admin\Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files (x86)\desktop.ini Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: WINWORD.EXE File opened (read-only) \??\Q: WINWORD.EXE File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: WINWORD.EXE File opened (read-only) \??\E: WINWORD.EXE File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: WINWORD.EXE File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: WINWORD.EXE File opened (read-only) \??\L: WINWORD.EXE File opened (read-only) \??\P: WINWORD.EXE File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: WINWORD.EXE File opened (read-only) \??\T: WINWORD.EXE File opened (read-only) \??\Z: WINWORD.EXE File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: WINWORD.EXE File opened (read-only) \??\V: WINWORD.EXE File opened (read-only) \??\X: WINWORD.EXE File opened (read-only) \??\U: WINWORD.EXE File opened (read-only) \??\Y: WINWORD.EXE File opened (read-only) \??\A: WINWORD.EXE File opened (read-only) \??\H: WINWORD.EXE File opened (read-only) \??\K: WINWORD.EXE File opened (read-only) \??\W: WINWORD.EXE File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: WINWORD.EXE File opened (read-only) \??\N: WINWORD.EXE File opened (read-only) \??\O: WINWORD.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41013 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BNC.bmp" Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BNC.bmp" Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp8009.bmp" Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1432 Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe 2340 Trojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exe 2572 svchost.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 3068 set thread context of 2888 3068 Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe 78 PID 1996 set thread context of 1668 1996 Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe 91 PID 1444 set thread context of 2864 1444 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 93 PID 1032 set thread context of 1796 1032 HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe 97 PID 2760 set thread context of 2768 2760 Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe 99 PID 1940 set thread context of 2528 1940 Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe 101 PID 1256 set thread context of 2168 1256 Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe 103 PID 2984 set thread context of 2952 2984 Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe 106 PID 2488 set thread context of 1576 2488 Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe 109 PID 2660 set thread context of 1752 2660 Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe 110 PID 1608 set thread context of 2220 1608 HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe 119 PID 2216 set thread context of 2900 2216 Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe 131 PID 2172 set thread context of 2364 2172 Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe 134 PID 2972 set thread context of 3716 2972 UDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exe 136 PID 2188 set thread context of 3916 2188 Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe 154 PID 2792 set thread context of 3272 2792 Trojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exe 160 PID 2764 set thread context of 752 2764 Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe 165 PID 3012 set thread context of 3352 3012 Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe 168 PID 1280 set thread context of 3148 1280 HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe 176 PID 3624 set thread context of 4060 3624 tkupdnxwwkky.exe 178 PID 4076 set thread context of 3112 4076 eqisnckqgbrf.exe 182 -
resource yara_rule behavioral1/memory/2888-220-0x0000000000C50000-0x0000000000C84000-memory.dmp upx behavioral1/memory/3068-189-0x0000000000C50000-0x0000000000C84000-memory.dmp upx behavioral1/files/0x0005000000019603-131.dat upx behavioral1/memory/3068-229-0x0000000000C50000-0x0000000000C84000-memory.dmp upx behavioral1/memory/2144-299-0x0000000000400000-0x00000000005DF000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSStr32.dll Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_ReCoVeRy_+vvnox.html pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_ReCoVeRy_+vvnox.html pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\sports_disc_mask.png pgoqahqwnyof.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_ReCoVeRy_+vvnox.html pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainBackground.wmv pgoqahqwnyof.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPIRM.XML Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\how_to_back_files.html Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\vistabg.png pgoqahqwnyof.exe File opened for modification C:\Program Files (x86)\Microsoft Office\OFFICE14\PROOF\MSSP7ES.dub msiexec.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_RECoVERY_+lfvsg.txt tkupdnxwwkky.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\_RECOVERY_+jejhg.html eqisnckqgbrf.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Microsoft.Synchronization.dll Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\how_to_back_files.html Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryLetter.dotx Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Northwind.accdt Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\_ReCoVeRy_+vvnox.html pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi eqisnckqgbrf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\_RECoVERY_+lfvsg.png tkupdnxwwkky.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.ComRPCChannel.dll Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_ButtonGraphic.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSWORD.OLB Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\menu_style_default_Thumbnail.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page.wmv pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_ReCoVeRy_+vvnox.html pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_RECoVERY_+lfvsg.html tkupdnxwwkky.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\how_to_back_files.html Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\how_to_back_files.html Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_SelectionSubpicture.png pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECoVERY_+lfvsg.png tkupdnxwwkky.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_content-background.png pgoqahqwnyof.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\_ReCoVeRy_+vvnox.txt pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\1047x576black.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\scrapbook.png pgoqahqwnyof.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_ReCoVeRy_+vvnox.html pgoqahqwnyof.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSClient.Msg.dll Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\pushplaysubpicture.png pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi eqisnckqgbrf.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt pgoqahqwnyof.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\_ReCoVeRy_+vvnox.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png pgoqahqwnyof.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG.wmv pgoqahqwnyof.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSCOL11.PPD Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieLetter.dotx Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\eqisnckqgbrf.exe Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification C:\Windows\win.ini Trojan-Ransom.Win32.Shade.ncm-0be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification C:\Windows\Installer\MSI75BE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6806.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File created C:\Windows\Installer\f78733f.ipi msiexec.exe File opened for modification C:\Windows\tkupdnxwwkky.exe Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe File opened for modification C:\Windows\Installer\MSI70FC.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification C:\Windows\spirituality Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe File opened for modification C:\Windows\Installer\MSI9295.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8FE6.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification C:\Windows\sqmvinsiq.exe Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File created C:\Windows\tkupdnxwwkky.exe Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe File opened for modification C:\Windows\Installer\f787346.ipi msiexec.exe File opened for modification C:\Windows\Installer\f78733f.ipi msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File created C:\Windows\Installer\f787346.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9D5F.tmp msiexec.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\ Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File created C:\Windows\pgoqahqwnyof.exe Trojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 756 2928 WerFault.exe 37 3220 1880 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqmvinsiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqisnckqgbrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nbv-69ba6ee95db4f02439a183c4d3f9dae71b9b0a4071c82076486573b446b38922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.ai-7d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkupdnxwwkky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.ex-891c9e5f09c94e1dd4ca1eed54c828a9c0f84c9ccfdede6856fa507d684a1293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.ndl-bcdbaf591fdaea9cf391c369b626a2d73a458759686db76e9b3ce857458eefb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.pef-0eff1fb1a0c9d0dc59cf909f1f931756e57e9af39a844340b247c69fc971b614.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifier.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.nep-ae1f435b9f0a0bbfc9cd2659520ba98b6a29d5961d142e4b36ba537583596b36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.vho-a977765a568fbabd5b00635cb7d58863154c32b50dce5a78e23428a5f721932a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifier.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqisnckqgbrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkupdnxwwkky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1240 PING.EXE 3688 cmd.exe 2816 cmd.exe 2372 cmd.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x00050000000195c0-112.dat nsis_installer_1 behavioral1/files/0x00050000000195c0-112.dat nsis_installer_2 behavioral1/files/0x00050000000195f7-120.dat nsis_installer_1 behavioral1/files/0x00050000000195f7-120.dat nsis_installer_2 -
Office loads VBA resources, possible macro or embedded object present
-
Interacts with shadow copies 3 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4340 vssadmin.exe 6852 vssadmin.exe 8428 vssadmin.exe 2676 vssadmin.exe 2328 vssadmin.exe 3728 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 3020 taskkill.exe -
Modifies Control Panel 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\winrs.exe\"" Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\verifier.exe\"" Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA848131-A512-11EF-8B93-E20EBDDD16B9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Key created \REGISTRY\USER\S-1-5-19 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Key created \REGISTRY\USER\S-1-5-20 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Key created \REGISTRY\USER\S-1-5-18 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\348141002F2306848A31776BD9FD3A5B msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\749801C0E1F98EA4FBD0985566B22EFF msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\F100B59B52C47924CBFBA19EC5849DE5\nlg_CSS\3082 = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e0065002b0053006d00560040006f0052005000390069005b003900330042004f0024007d0047005f0000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\08A8626828AA2A94A98100AD723D0E35\3082\Normal = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e002d0025002e004f00360078006d00740036003f002a0021002700720070003d004d004f006000370000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\CF77AD9C8F812714D856D0EAD5C1DEA1 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\CF77AD9C8F812714D856D0EAD5C1DEA1\ProofModelFile\3082 = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e0024004e0073004c005a00600076007d002d003f00360056007d004b004e005300310061004f00670000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\00004109F100A0C00000000000F01FEC msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\5A50719A84B76D84A8F200EADBA2D79F\3082\Normal = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e007b0039006d00520069005f0047005700310040006c002c00730040002e004200670035005a006c0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\36D0A086BEFF5CD46B8920ABFA2A9819 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\F100B59B52C47924CBFBA19EC5849DE5 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\749801C0E1F98EA4FBD0985566B22EFF\3082 = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e006800760059007300350076004800320070003d007300570033005d006c0061006a004c004e00390000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\36D0A086BEFF5CD46B8920ABFA2A9819\3082 = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e002c0074002900360036007a004c00300049003900510044005e0041002900290021002d005200640000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\F100B59B52C47924CBFBA19EC5849DE5\nlg_updates\3082 = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e005a00400058004d006d006d0078002e003d0039007d004c0024002600510049006f0063006600560000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\31F84C4FF7A14B64AACA203BBFDCE4CD\ProofDataFile\3082 = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e0069002e0055006b007700210032006100300041007b0047005e00330047004d00610051007700780000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\08A8626828AA2A94A98100AD723D0E35 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\31F84C4FF7A14B64AACA203BBFDCE4CD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\00004109F100A0C00000000000F01FEC\SpellingAndGrammarFiles_3082 msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\5A50719A84B76D84A8F200EADBA2D79F msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Components\348141002F2306848A31776BD9FD3A5B\3082\3082 = 780062002700420056005e007d00740072002600210021002100210021004d004b004b0053006b005300700065006c006c0069006e00670041006e0064004700720061006d006d0061007200460069006c00650073005f0033003000380032003e0046007e0052006b004700470046006e006700380056004e005f005d0068004600390060007e00530000000000 msiexec.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\ Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\\Certificates Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\\CRLs Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\\CTLs Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 2112 NOTEPAD.EXE 4108 NOTEPAD.EXE 5536 NOTEPAD.EXE 5756 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1240 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1612 WINWORD.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 45 IoCs
pid Process 1444 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2928 HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe 1032 HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe 1280 HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe 632 HEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exe 1608 HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe 316 HEUR-Trojan-Ransom.Win32.Zerber.pef-0eff1fb1a0c9d0dc59cf909f1f931756e57e9af39a844340b247c69fc971b614.exe 1936 HEUR-Trojan-Ransom.Win32.Zerber.vho-a977765a568fbabd5b00635cb7d58863154c32b50dce5a78e23428a5f721932a.exe 2984 Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe 3012 Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe 2728 Trojan-Ransom.Win32.Agent.iyo-4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79.exe 2188 Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe 2216 Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe 2172 Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe 2148 Trojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exe 2156 Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe 3068 Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe 1528 Trojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exe 1432 Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe 2340 Trojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exe 320 Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe 1996 Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe 836 Trojan-Ransom.Win32.Locky.ai-7d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142.exe 1376 Trojan-Ransom.Win32.Locky.bil-ada2164654315680132754a7063d2b94428d9101f302ff2a90dba6ab8ebd82b9.exe 1532 Trojan-Ransom.Win32.Locky.ex-891c9e5f09c94e1dd4ca1eed54c828a9c0f84c9ccfdede6856fa507d684a1293.exe 2464 Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe 1124 Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe 2488 Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe 1256 Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe 1940 Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe 912 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe 768 Trojan-Ransom.Win32.Shade.nbv-69ba6ee95db4f02439a183c4d3f9dae71b9b0a4071c82076486573b446b38922.exe 2580 Trojan-Ransom.Win32.Shade.ncm-0be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a.exe 2144 Trojan-Ransom.Win32.Shade.ndg-a6471b8ea3b85c148a224157126c0ea3db8e803af5f93daa7deb4d63afc38d90.exe 1536 Trojan-Ransom.Win32.Shade.ndl-bcdbaf591fdaea9cf391c369b626a2d73a458759686db76e9b3ce857458eefb4.exe 2020 Trojan-Ransom.Win32.Shade.nep-ae1f435b9f0a0bbfc9cd2659520ba98b6a29d5961d142e4b36ba537583596b36.exe 292 Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe 2936 Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe 2880 Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe 2792 Trojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exe 2764 Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe 2760 Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe 2660 Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe 2656 UDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exe 2972 UDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 320 Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe 320 Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe 1528 Trojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exe 1528 Trojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 2864 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe -
Suspicious behavior: MapViewOfSection 13 IoCs
pid Process 2340 Trojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exe 2340 Trojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exe 1432 Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe 1432 Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe 1996 Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe 1444 HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe 1032 HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe 2760 Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe 2488 Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe 2660 Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe 1608 HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe 2972 UDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exe 1280 HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 956 7zFM.exe Token: 35 956 7zFM.exe Token: SeSecurityPrivilege 956 7zFM.exe Token: SeDebugPrivilege 2076 taskmgr.exe Token: SeDebugPrivilege 2936 Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe Token: SeDebugPrivilege 2880 Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe Token: SeDebugPrivilege 2916 winrs.exe Token: SeBackupPrivilege 2468 vssvc.exe Token: SeRestorePrivilege 2468 vssvc.exe Token: SeAuditPrivilege 2468 vssvc.exe Token: SeDebugPrivilege 2644 verifier.exe Token: SeIncreaseQuotaPrivilege 1692 wmic.exe Token: SeSecurityPrivilege 1692 wmic.exe Token: SeTakeOwnershipPrivilege 1692 wmic.exe Token: SeLoadDriverPrivilege 1692 wmic.exe Token: SeSystemProfilePrivilege 1692 wmic.exe Token: SeSystemtimePrivilege 1692 wmic.exe Token: SeProfSingleProcessPrivilege 1692 wmic.exe Token: SeIncBasePriorityPrivilege 1692 wmic.exe Token: SeCreatePagefilePrivilege 1692 wmic.exe Token: SeBackupPrivilege 1692 wmic.exe Token: SeRestorePrivilege 1692 wmic.exe Token: SeShutdownPrivilege 1692 wmic.exe Token: SeDebugPrivilege 1692 wmic.exe Token: SeSystemEnvironmentPrivilege 1692 wmic.exe Token: SeRemoteShutdownPrivilege 1692 wmic.exe Token: SeUndockPrivilege 1692 wmic.exe Token: SeManageVolumePrivilege 1692 wmic.exe Token: 33 1692 wmic.exe Token: 34 1692 wmic.exe Token: 35 1692 wmic.exe Token: SeDebugPrivilege 2148 Trojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exe Token: 33 980 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 980 AUDIODG.EXE Token: 33 980 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 980 AUDIODG.EXE Token: SeIncreaseQuotaPrivilege 1692 wmic.exe Token: SeSecurityPrivilege 1692 wmic.exe Token: SeTakeOwnershipPrivilege 1692 wmic.exe Token: SeLoadDriverPrivilege 1692 wmic.exe Token: SeSystemProfilePrivilege 1692 wmic.exe Token: SeSystemtimePrivilege 1692 wmic.exe Token: SeProfSingleProcessPrivilege 1692 wmic.exe Token: SeIncBasePriorityPrivilege 1692 wmic.exe Token: SeCreatePagefilePrivilege 1692 wmic.exe Token: SeBackupPrivilege 1692 wmic.exe Token: SeRestorePrivilege 1692 wmic.exe Token: SeShutdownPrivilege 1692 wmic.exe Token: SeDebugPrivilege 1692 wmic.exe Token: SeSystemEnvironmentPrivilege 1692 wmic.exe Token: SeRemoteShutdownPrivilege 1692 wmic.exe Token: SeUndockPrivilege 1692 wmic.exe Token: SeManageVolumePrivilege 1692 wmic.exe Token: 33 1692 wmic.exe Token: 34 1692 wmic.exe Token: 35 1692 wmic.exe Token: SeDebugPrivilege 2364 Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe Token: SeDebugPrivilege 3020 taskkill.exe Token: 0 2580 Trojan-Ransom.Win32.Shade.ncm-0be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a.exe Token: SeDebugPrivilege 1704 pgoqahqwnyof.exe Token: SeDebugPrivilege 2900 Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe Token: SeIncreaseQuotaPrivilege 3780 wmic.exe Token: SeSecurityPrivilege 3780 wmic.exe Token: SeTakeOwnershipPrivilege 3780 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 956 7zFM.exe 956 7zFM.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 632 HEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2464 Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 1124 Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 632 HEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exe 2076 taskmgr.exe 2076 taskmgr.exe 1612 WINWORD.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 3252 iexplore.exe 2208 Explorer.EXE -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2464 Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 1124 Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE 2208 Explorer.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2188 Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe 292 Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe 292 Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe 2764 Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe 2792 Trojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exe 1612 WINWORD.EXE 1612 WINWORD.EXE 2296 sqmvinsiq.exe 3252 iexplore.exe 3252 iexplore.exe 3204 IEXPLORE.EXE 3204 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 8 IoCs
pid Process 912 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe 2936 Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe 2880 Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe 2100 Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe 2916 winrs.exe 2644 verifier.exe 1256 winrs.exe 3740 verifier.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2700 1688 cmd.exe 35 PID 1688 wrote to memory of 2700 1688 cmd.exe 35 PID 1688 wrote to memory of 2700 1688 cmd.exe 35 PID 1688 wrote to memory of 1444 1688 cmd.exe 36 PID 1688 wrote to memory of 1444 1688 cmd.exe 36 PID 1688 wrote to memory of 1444 1688 cmd.exe 36 PID 1688 wrote to memory of 1444 1688 cmd.exe 36 PID 1688 wrote to memory of 2928 1688 cmd.exe 37 PID 1688 wrote to memory of 2928 1688 cmd.exe 37 PID 1688 wrote to memory of 2928 1688 cmd.exe 37 PID 1688 wrote to memory of 2928 1688 cmd.exe 37 PID 1688 wrote to memory of 1032 1688 cmd.exe 38 PID 1688 wrote to memory of 1032 1688 cmd.exe 38 PID 1688 wrote to memory of 1032 1688 cmd.exe 38 PID 1688 wrote to memory of 1032 1688 cmd.exe 38 PID 1688 wrote to memory of 1280 1688 cmd.exe 39 PID 1688 wrote to memory of 1280 1688 cmd.exe 39 PID 1688 wrote to memory of 1280 1688 cmd.exe 39 PID 1688 wrote to memory of 1280 1688 cmd.exe 39 PID 1688 wrote to memory of 632 1688 cmd.exe 40 PID 1688 wrote to memory of 632 1688 cmd.exe 40 PID 1688 wrote to memory of 632 1688 cmd.exe 40 PID 1688 wrote to memory of 632 1688 cmd.exe 40 PID 1688 wrote to memory of 1608 1688 cmd.exe 41 PID 1688 wrote to memory of 1608 1688 cmd.exe 41 PID 1688 wrote to memory of 1608 1688 cmd.exe 41 PID 1688 wrote to memory of 1608 1688 cmd.exe 41 PID 1688 wrote to memory of 316 1688 cmd.exe 43 PID 1688 wrote to memory of 316 1688 cmd.exe 43 PID 1688 wrote to memory of 316 1688 cmd.exe 43 PID 1688 wrote to memory of 316 1688 cmd.exe 43 PID 2928 wrote to memory of 756 2928 HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe 42 PID 2928 wrote to memory of 756 2928 HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe 42 PID 2928 wrote to memory of 756 2928 HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe 42 PID 2928 wrote to memory of 756 2928 HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe 42 PID 1688 wrote to memory of 1936 1688 cmd.exe 44 PID 1688 wrote to memory of 1936 1688 cmd.exe 44 PID 1688 wrote to memory of 1936 1688 cmd.exe 44 PID 1688 wrote to memory of 1936 1688 cmd.exe 44 PID 1688 wrote to memory of 2984 1688 cmd.exe 45 PID 1688 wrote to memory of 2984 1688 cmd.exe 45 PID 1688 wrote to memory of 2984 1688 cmd.exe 45 PID 1688 wrote to memory of 2984 1688 cmd.exe 45 PID 1688 wrote to memory of 3012 1688 cmd.exe 46 PID 1688 wrote to memory of 3012 1688 cmd.exe 46 PID 1688 wrote to memory of 3012 1688 cmd.exe 46 PID 1688 wrote to memory of 3012 1688 cmd.exe 46 PID 1688 wrote to memory of 2728 1688 cmd.exe 47 PID 1688 wrote to memory of 2728 1688 cmd.exe 47 PID 1688 wrote to memory of 2728 1688 cmd.exe 47 PID 1688 wrote to memory of 2728 1688 cmd.exe 47 PID 1688 wrote to memory of 2188 1688 cmd.exe 48 PID 1688 wrote to memory of 2188 1688 cmd.exe 48 PID 1688 wrote to memory of 2188 1688 cmd.exe 48 PID 1688 wrote to memory of 2188 1688 cmd.exe 48 PID 1688 wrote to memory of 2216 1688 cmd.exe 49 PID 1688 wrote to memory of 2216 1688 cmd.exe 49 PID 1688 wrote to memory of 2216 1688 cmd.exe 49 PID 1688 wrote to memory of 2216 1688 cmd.exe 49 PID 1688 wrote to memory of 2172 1688 cmd.exe 50 PID 1688 wrote to memory of 2172 1688 cmd.exe 50 PID 1688 wrote to memory of 2172 1688 cmd.exe 50 PID 1688 wrote to memory of 2172 1688 cmd.exe 50 PID 1688 wrote to memory of 2148 1688 cmd.exe 51 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" pgoqahqwnyof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tkupdnxwwkky.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tkupdnxwwkky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System eqisnckqgbrf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" eqisnckqgbrf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pgoqahqwnyof.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00291.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:956
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.MSIL.Crypren.gen-d10641bf82beae9ab02073e8e1c8b293bac836fb37b81b07e4725da010bebbb8.exeHEUR-Trojan-Ransom.MSIL.Crypren.gen-d10641bf82beae9ab02073e8e1c8b293bac836fb37b81b07e4725da010bebbb8.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2700 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Documents\save_your_files.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3252 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3204
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3252 CREDAT:603147 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3252 CREDAT:1520656 /prefetch:24⤵PID:7332
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3252 CREDAT:1455127 /prefetch:24⤵PID:6496
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3252 CREDAT:3617826 /prefetch:24⤵PID:4112
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3252 CREDAT:3224616 /prefetch:24⤵PID:3592
-
-
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exeHEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1444 -
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exeHEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exeHEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 1283⤵
- Loads dropped DLL
- Program crash
PID:756
-
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exeHEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1032 -
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exeHEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796
-
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exeHEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1280 -
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exeHEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe3⤵PID:3148
-
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exeHEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
PID:632
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1608 -
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exeHEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Zerber.pef-0eff1fb1a0c9d0dc59cf909f1f931756e57e9af39a844340b247c69fc971b614.exeHEUR-Trojan-Ransom.Win32.Zerber.pef-0eff1fb1a0c9d0dc59cf909f1f931756e57e9af39a844340b247c69fc971b614.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:316
-
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Zerber.vho-a977765a568fbabd5b00635cb7d58863154c32b50dce5a78e23428a5f721932a.exeHEUR-Trojan-Ransom.Win32.Zerber.vho-a977765a568fbabd5b00635cb7d58863154c32b50dce5a78e23428a5f721932a.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1936
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exeTrojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2984 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exeTrojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe3⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exeTrojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3012 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exeTrojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe3⤵PID:3352
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Agent.iyo-4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79.exeTrojan-Ransom.Win32.Agent.iyo-4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2728
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exeTrojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exeTrojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\sqmvinsiq.exeC:\Windows\sqmvinsiq.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Windows\sqmvinsiq.exeC:\Windows\sqmvinsiq.exe5⤵PID:3488
-
C:\Users\Admin\Documents\iefqv.exeC:\Users\Admin\Documents\iefqv.exe6⤵PID:4296
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:4340
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_H_e_l_p_RECOVER_INSTRUCTIONS.TXT6⤵
- Opens file in notepad (likely ransom note)
PID:5536
-
-
C:\Users\Admin\Documents\pkher.exeC:\Users\Admin\Documents\pkher.exe6⤵PID:6264
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet7⤵
- Interacts with shadow copies
PID:6852
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\SQMVIN~1.EXE6⤵PID:5364
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00291\TROJAN~4.EXE4⤵PID:3248
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exeTrojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2216 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exeTrojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\eqisnckqgbrf.exeC:\Windows\eqisnckqgbrf.exe4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\eqisnckqgbrf.exeC:\Windows\eqisnckqgbrf.exe5⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:3112 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:4016
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- Opens file in notepad (likely ransom note)
PID:2112
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:6288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\EQISNC~1.EXE6⤵PID:3876
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00291\TR583C~1.EXE4⤵PID:3184
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exeTrojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2172 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exeTrojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Windows\tkupdnxwwkky.exeC:\Windows\tkupdnxwwkky.exe4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\tkupdnxwwkky.exeC:\Windows\tkupdnxwwkky.exe5⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:4060 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:960
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- Opens file in notepad (likely ransom note)
PID:5756
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:6768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\TKUPDN~1.EXE6⤵PID:7652
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00291\TRD4A4~1.EXE4⤵PID:3764
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exeTrojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Windows\pgoqahqwnyof.exeC:\Windows\pgoqahqwnyof.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1704 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵PID:3528
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT4⤵
- Opens file in notepad (likely ransom note)
PID:4108
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive4⤵PID:5284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\PGOQAH~1.EXE4⤵PID:5400
-
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe"5⤵PID:8452
-
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:8428
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete6⤵PID:1600
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no6⤵
- Modifies boot configuration data using bcdedit
PID:3452
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures6⤵
- Modifies boot configuration data using bcdedit
PID:3364
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt6⤵PID:7492
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00291\TR8AC0~1.EXE3⤵PID:2884
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exeTrojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2156 -
C:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exeC:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exe3⤵PID:3240
-
C:\Windows\SysWOW64\cmd.exe/a /c netsh advfirewall firewall add rule name="alFSVWJB" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\alFSVWJB\FDZIVA~1.EXE"4⤵PID:7320
-
-
C:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exe"C:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exe"4⤵PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exe/a /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\Desktop\00291\TR7796~1.EXE"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3688
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exeTrojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3068 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exeC:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe3⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on4⤵
- Modifies Windows Firewall
PID:1448
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset4⤵
- Modifies Windows Firewall
PID:2996
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THI$_FILE_T35G_.hta"4⤵PID:1852
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THI$_FILE_5Y34CIV_.txt4⤵PID:3360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:6596
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exeTrojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exeTrojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1432
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exeTrojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2340
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exeTrojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Users\Admin\AppData\Local\WBUT\winlogonupdater.exe"C:\Users\Admin\AppData\Local\WBUT\winlogonupdater.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Users\Admin\AppData\Local\WBUT\winlogonupdater.exe" "Update Bluetooth Support Service" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2292
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exeTrojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:1996 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exeTrojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CE68\E734.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Comrenum\C_G1ring.exe" "C:\Users\Admin\Desktop\00291\TRBA7F~1.EXE""4⤵PID:3068
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.ai-7d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142.exeTrojan-Ransom.Win32.Locky.ai-7d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:836 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\system32\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys73F8.tmp"3⤵PID:1592
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.bil-ada2164654315680132754a7063d2b94428d9101f302ff2a90dba6ab8ebd82b9.exeTrojan-Ransom.Win32.Locky.bil-ada2164654315680132754a7063d2b94428d9101f302ff2a90dba6ab8ebd82b9.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1376
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.ex-891c9e5f09c94e1dd4ca1eed54c828a9c0f84c9ccfdede6856fa507d684a1293.exeTrojan-Ransom.Win32.Locky.ex-891c9e5f09c94e1dd4ca1eed54c828a9c0f84c9ccfdede6856fa507d684a1293.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1532
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exeTrojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysAFCF.tmp"3⤵PID:3688
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exeTrojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1124 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysBEFC.tmp"3⤵PID:8348
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exeTrojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2488 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exeTrojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exeTrojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1256 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exeTrojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exeTrojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1940 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exeTrojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:2676
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exeTrojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of UnmapMainImage
PID:912 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe"C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe" g3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2100
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2328
-
-
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:3728
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.nbv-69ba6ee95db4f02439a183c4d3f9dae71b9b0a4071c82076486573b446b38922.exeTrojan-Ransom.Win32.Shade.nbv-69ba6ee95db4f02439a183c4d3f9dae71b9b0a4071c82076486573b446b38922.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:768
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.ncm-0be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a.exeTrojan-Ransom.Win32.Shade.ncm-0be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.ndg-a6471b8ea3b85c148a224157126c0ea3db8e803af5f93daa7deb4d63afc38d90.exeTrojan-Ransom.Win32.Shade.ndg-a6471b8ea3b85c148a224157126c0ea3db8e803af5f93daa7deb4d63afc38d90.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2144 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\FB84AA7D.rtf"3⤵
- Enumerates connected drives
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.ndl-bcdbaf591fdaea9cf391c369b626a2d73a458759686db76e9b3ce857458eefb4.exeTrojan-Ransom.Win32.Shade.ndl-bcdbaf591fdaea9cf391c369b626a2d73a458759686db76e9b3ce857458eefb4.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1536
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.nep-ae1f435b9f0a0bbfc9cd2659520ba98b6a29d5961d142e4b36ba537583596b36.exeTrojan-Ransom.Win32.Shade.nep-ae1f435b9f0a0bbfc9cd2659520ba98b6a29d5961d142e4b36ba537583596b36.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2020
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exeTrojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:292
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Wanna.zbu-2d80b45f96384837870a4f1c07a24b2bbecce0c17b7c4861f2bbc44ea64e9415.exeTrojan-Ransom.Win32.Wanna.zbu-2d80b45f96384837870a4f1c07a24b2bbecce0c17b7c4861f2bbc44ea64e9415.exe2⤵
- Executes dropped EXE
PID:2308
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exeTrojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2936 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.dct-67171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02.exe" > NUL3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2372
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exeTrojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2880 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\winrs.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\winrs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2916
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2816 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dsv-5a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1240
-
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exeTrojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exeTrojan-Ransom.Win32.Zerber.ecmz-af398b8ce35aee1777c391003a7b690638c1b2d5a1476665d090446a24ce6402.exe3⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exeTrojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exeTrojan-Ransom.Win32.Zerber.edjj-fb6347f50299331f9b72e32e65799af6e471a3e33d3b76e5b1d57635b7499ba3.exe3⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exeTrojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2760 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exeTrojan-Ransom.Win32.Zerber.uwo-916fa966e53c09fcdfa07f673c0dde05fe506baa513ee695aeac75cbf2bead31.exe3⤵
- Executes dropped EXE
PID:2768
-
-
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exeTrojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2660 -
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exeTrojan-Ransom.Win32.Zerber.wtl-b16aaf3222fe784e6b6ad691354550dc90b825b40d96f414396ced60e2c08d58.exe3⤵
- Executes dropped EXE
PID:1752
-
-
-
C:\Users\Admin\Desktop\00291\UDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exeUDS-Trojan-Ransom.Win32.CryptXXX.sb-5d49361cc6c77f2861fad9e464bea96c6e2b036dfb33d1cefc64c977ffd917b3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\ddacabfcdbhi.exeC:\Users\Admin\AppData\Local\Temp\ddacabfcdbhi.exe 8-8-8-6-1-2-0-2-2-3-4 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⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731868539.txt bios get serialnumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731868539.txt bios get version4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731868539.txt bios get version4⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731868539.txt bios get version4⤵
- System Location Discovery: System Language Discovery
PID:348
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81731868539.txt bios get version4⤵PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 3684⤵
- Loads dropped DLL
- Program crash
PID:3220
-
-
-
-
C:\Users\Admin\Desktop\00291\UDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exeUDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2972 -
C:\Users\Admin\Desktop\00291\UDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exeUDS-Trojan-Ransom.Win32.Zerber.sb-2a50275636b7a3336f47584dc68ca3d34429928d3e5ad9f8f3643d41583c93be.exe3⤵PID:3716
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2076
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2572
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:Wuac7KI="6";n1f=new%20ActiveXObject("WScript.Shell");tM5lMoo="ijWO";m16MWf=n1f.RegRead("HKLM\\software\\Wow6432Node\\TZgNNY8z6k\\BiVmup");JRXR7j="4QVjIs";eval(m16MWf);iEZHP95fp="Is3k8";1⤵
- Process spawned unexpected child process
PID:2200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:ebyhzzxr2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe3⤵PID:1512
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"4⤵PID:5056
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4801⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1783842209117441584462370967-183877669-6538749921863835938112357163765461973"1⤵PID:2996
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3708 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7131B671F85CDF9F8CB6D9CF4647D4DB2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 563881C4BADF545E6E2EDC2424DEB78D2⤵
- Loads dropped DLL
PID:2896
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 91863F80DB5FE196931729E8FCD9D0222⤵PID:4056
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C763A2F3270EA5C11D04C72FF4C05FDC M Global\MSI00002⤵PID:1520
-
-
C:\Windows\Explorer.EXE"C:\Windows\Explorer.EXE"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2208 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\winrs.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\winrs.exe"2⤵
- Suspicious use of UnmapMainImage
PID:1256
-
-
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3740
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵PID:6516
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Setup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Setup.exe" -Embedding1⤵
- Loads dropped DLL
PID:208
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
PID:3464
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:204
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4648
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 33AD1529C20ED0201FC1C059B28E7BE12⤵PID:5664
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7186722781A8FEB7A1C947AD5BF134D7 M Global\MSI00002⤵PID:8040
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A524F52281F832A7576E991749C4911B2⤵PID:8980
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:8184
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3472
-
C:\Windows\system32\taskeng.exetaskeng.exe {6E046F42-FBD4-4047-9EEF-507D6FE800B9} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵PID:1544
-
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exeC:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe2⤵PID:4272
-
-
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exeC:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\verifier.exe2⤵PID:7708
-
-
C:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exeC:\Users\Admin\AppData\Roaming\alFSVWJB\fdzivafvd.exe2⤵PID:3388
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Setup.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Setup.exe" -Embedding1⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
10Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
2Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ce25afe315988807ce28b1a6abc376c0
SHA1442209dbadc71cfb8b7f2be634ef459fe47c821c
SHA256f4e5c2f1b9a594d0b61b9fab443f39b4022affcd98abf903bbc127b2d3384a29
SHA5128a34d611b7f6cc409577780572fcfb02450620a43d587d2464e5c05119e4e1f6e992008dbe9c5248437c542a0d45d01eb6b253fe51ba28c35bab01138ec05cb6
-
Filesize
695KB
MD5f7a2a5b1c5e71d62607d969f34b7df77
SHA1208c84dc9ae575faa5d92fa05512d4031a4a89ab
SHA2564167dafb557ee4d6ba61c9cc54fe10d16efdb014541dcd6e01b851267567149f
SHA512c3210d53327c1618cc3c4d7bdd6df0cd0fcb42e64d7d5ae2f1e681adf0ea5b07f04e8e5d03920c79d0da269de0db1c1c781cc4564226802194eca0ce69a6eac0
-
Filesize
669KB
MD50a67d8e81f5d963c85ef8a3a0a87a401
SHA1bd1796ffd98a964294c428555c6d9e3c9eac953e
SHA25665f1ef1230c18f413db6e9850f83be8aeca0cf4e6b9d06658c353522081e2b3e
SHA51231c27f3798de41c53ab6fdb2a62a4350bcb9deaf410bb6f30f8fcba0138077aa4de1c786ec00553221166b68da07c8e58aa2896d25cfd5f15dfa4954186589dd
-
Filesize
8KB
MD5da858716485bc2adddc72c5b63d0f84d
SHA1cd28ab4604c17b45d358065f63daa4fa89671d1e
SHA256d746fa094a14122301ff7f535120e0732db9fcd4dd4cb37add92d7f2e491be60
SHA512a1581a453d788ff82f6b491ea02141ff9b8f7a9070f18511dbaeaac42df0ce41f15e756a3d4365349420122d293bb4019c229d8843d98c3d5ed50093fbf0f8b3
-
Filesize
6KB
MD57459487489e157727e67d5d028b50143
SHA1c93ec1359504f85e820851f308c1600c2e4d120e
SHA256493fcc79d368b78448dd3ce373181ea429cfa1bf9a4cf59e22579840393232be
SHA512f66bc4816708ee6903aa1aad383483a25cc34d1c962128aa68eb2d9c93eaa2ab5f4b2818ad09603b19a5de0a6b13bef1ebcc7d236d9aa3e94f0d2140e0b3d3e0
-
Filesize
67KB
MD51d8e4754ef23a2c1baf9d50348cfb491
SHA1d54ad72ba7f10968b4fcd0ade79e124ee5c030b7
SHA256e9ec5e9e8f800a94f43522453a669e383c4fcf8227ad7b78ab16adec2b3deb30
SHA512c5ef7db536994e5af538c0a2a4f8600554714aaa1ed016dea132d3caa7127f386ad54d2da617f494fc4586fa75bf73ebbb2c3f28c1eb545fb946bed2dda7d1bf
-
Filesize
2KB
MD5d0c3dd57b9968cc51ca8d727a9504ff8
SHA1d9716fd2b01ded0364ff5d0cd50dd497218de270
SHA2566d21672fef00aa4d4b068f8f033ab7fce6f16762dd3ee9bd98a5a27993e0a3e7
SHA5125bb41e60abe42dbdd107fc2516e3baf7103dd4cf7fa6f96edd8cce6b04bf1570fbb6cd0a1d48500dcf2db5b436bc87f6fe49e05dac64fbf4011aa7215ad5b089
-
Filesize
11KB
MD50ff73e3212ea3353497fa07c6158224c
SHA12023f1fcd3f0ed94a84103e370a6dbc7e65c409a
SHA25679ce3b4e7fff1ce81238414112607bf25c46fab47a2b0c507d5453f3d5784477
SHA51275511a01d15eb3e73e4c81369538dbc8564f85860c5f20ac73c77991b1a826a2aeba11c81a9127d1a61f5a63d7538b64f506684d72dfb13947a03c1a8314c471
-
Filesize
63KB
MD5c97e34dc32cb98cfb2b0cbf395003744
SHA15a34cff745b2ed48b6931983c84aeece8590e644
SHA256cbb5d30c707597c7659e891ed945b05818c7834c6613532745b9a41f7cfc6056
SHA5123f540460a22768e9541b434710fa37e902f2c7a068b7bc3e8464ed7baf0cc79cd36326f1ca429b5f03d8492b91a1803b90b78f429f66cff42327cd42ea3a803d
-
Filesize
1KB
MD5351b5ab4c6e048f4e54cef886f958cc6
SHA160d9c43b0960f677df7841413dfba9f389a4bfab
SHA25690bfe1ecdfa0a6e311a287fd4973b0b74b695c6c60442470bc71072373177cd3
SHA512d1e83aeef931f3b1d0aa0341ace251d79f6a76ccd1506728489b365ab2d99237acb8394e23c91c9321f02ad48b3810d5e05d74c1821a2070a424505893d6497f
-
Filesize
36KB
MD5790842ec65453722e23fe92277ed6b31
SHA1f78868ca12891ffdc7c3acf33af487fe61829072
SHA256eed23b57d6da5275a68b515e38f7e7c399efcb88a37b5686589aac32a8eaf120
SHA512417b006dfc819996e3073f27bc490e63e8a9477a408da56f25ed54c400577a62f5bb398309783fcb82fd4bdd95a00dd255f5e3666f285b5fccf65743368d8bc3
-
Filesize
892B
MD590a0321357d3453ad4e5e363c0636c44
SHA1819da177c8adc834eb785994966db6f862d9353c
SHA25656c3476b1f23de7e3276518e6ab82c07e980d862b99bfa091a9fc5f747d3097f
SHA512b3a9d8884297259bdaac6198c94a179dbe93a9187170afa3f36b8fed6bd6bdf0fcdcdc72137661be5c7c4359086a687a21ed35c51c6bd56e55457e9d1ebe3603
-
Filesize
11KB
MD5e46c984da455018c51486b716f3953c2
SHA16b6cd71ce167b590351406e2dff594ba418ccf59
SHA256dcbb067ad61f28255b882d44d92a47bd0445266e783d02b38bb1ff71b6efa65e
SHA512544d509dabb2dd91fe5b1f3ae9b2b1a481a25037d404a557eb79b485285c4d6a4e6e4c9a68f249ea659b8fec526969d66fae39971671e1a9b1fccea5e613bb2e
-
Filesize
64KB
MD538f6a048f9668b3f096061128ba7ed8e
SHA1afedd4367999381c401aba16ac770daca9a34d05
SHA2565ff1738f90071a19f651b5c8563c84a0e0bb4d03f9ba8a361a8c5361aa19fda5
SHA5129402b6c8757d7f4d127142700e095618483431f9060e34003598e4738c6f5629bb766167ab3ccae5c4256f88b8993ab32c104695661a5995550083810f7a705a
-
Filesize
1KB
MD50217290fa9d1f69d63f93ec133015f0a
SHA11c608ab5001596f69d587b0080a4d62d14445f77
SHA25690f859d3422d06263bfd3387627e7ea95119e425cca58f3335d6ae1ef16670e6
SHA512e3f41d293c14197c35286d028587392816adb3ba1921dc0766c9766fc6990c39decd2e0815752a525f0b47c09a6375173e2ba2e3c3a6e13672297421d6e4c121
-
Filesize
8KB
MD53c0bd626efba265ddb10ce5fd88434fc
SHA1841bd899f063210b2cb49f9fe1570dcbc32d0e5e
SHA256529d920b27fe068a9846b202147a7ddf6019571f6024ea572fc4f18b09b823c0
SHA5123d8dde09c2bd54175a195e5f4e49e9cde335dedecefe6f9624d4aed7d650849c717b616b35040b9aa76c589235ab182ed414bdc2998b60af7ced208fe2932659
-
Filesize
8KB
MD5e8c8bfb2fd888a6d0ebaf8bcf388e593
SHA123a1654ba16f31b22428271329a2dc21569509a6
SHA256deee32ede716d3b744acb6d7f62b3b91eb548e38dd2127ce7c1e8b87cfb71fc0
SHA512acc55198c1d8a5ed512b3a4d6f1569e675d50d47145ad52df948cdc6ad558e4b060d8e6df6045fbc26747c57095511d387f26db60b4783a8ddbf08c232ef8760
-
Filesize
8KB
MD5a96ea5fc35f5ce16a5999fa042b5caca
SHA140bad9797991365267cedc66371701bd39fca753
SHA25608450d7e4603e21f12a020b0e2c30bd173fc68396c154087993c2efd7444e5c7
SHA512386b564346992698b404d807c16123f9b28e10d1b8af82e78308db943a909baacb95f60d26e410c9f7e33dba2a108cb01c2fd9b0df395bdfbf2c50fe7982b271
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt
Filesize27KB
MD5b2c517b027781aa776cd7e8a641cc499
SHA19973d650aa4ebd99be156a018ce89aa3448c1a93
SHA256f113926aebf46b14ec3ce639183e6ea57b15f5e3a7157571cd552a4754b8823b
SHA5124519f3a1fcb51b5721c55372af0cbe6c16d86cd19e3b37343e797fae76a400fba576e870dff205ca1d192bb06de025f259b88f6f97c36973e99733dbaf70e759
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\TAB_OFF.GIF
Filesize400B
MD5232cfd73bc131c96e3233e75765e9099
SHA1578b2aa4cb3c6d2c7832ec6267e3effc1dcbb89f
SHA256b3e357da981528342b43f57760d5cb572bbbb626cbedddcc9c8d734edda821b2
SHA512020b134587a26f28e50aa885029819061e3f0747e1adbc483dfc6e57d4b5f6bd26f2656362ecf1b606dd1719563c0d5dc8deb91aa16bcb337364f898ff58342e
-
Filesize
240B
MD50c40a4e57d33506295dd151fcb9e8342
SHA1fe297c81bafac00b7047bcf09664f1b42b523767
SHA25696999561ffd5ee0cb2fa3e0e2c2c22454854aceb468f3e76ecbfa23df15f74e8
SHA512beb13de65a2fce2c5b0fa5d70826ecd579eff8b133ef39e5dfa7230ff7beca0153e6e161f6ac7c906263d53f1e38204e37983b4b193e5dd423fddb98a2d65e0c
-
Filesize
304B
MD5b899f8590b305c547a9fe0044caa6588
SHA10ce059db909de8c74fad75a9285e7c08998c09e2
SHA256b6102f1904863f8339678b3a41d96516f5416d1509ebcb72b9c23442ccaf9bcc
SHA512f98961c98d20552d6e58fd39eace2489dd61229d8a7a5713747fb63daa8f11a0de2c0716bfe700571ec01c2af8e5becc8ea06cd9b83854ceedc053ef29cd1865
-
Filesize
400B
MD597366f037ba53246f6b7f4ad4af4f796
SHA10ad23ef35021c7ab5e181021feb8394a20a07409
SHA256af5a3eac3ca79c23b23bc25e3b00c863f646454594c904a35a8f07ac3f0455fa
SHA51249b4554f578de4b227e5721853baca783fc0e35237587e4288e2546a4222d8115455a1b07be7ba21fe164983cdc895d9129d841984b9fd187191081a825f6f17
-
Filesize
400B
MD5379bafd4e10086bcce5c81372138c4ca
SHA127c822e983a305dece438817930c877536674b53
SHA2567b2af7fee8304e2e0d70f4119ab82d810a492a047cdd939bba37a7cdf387af15
SHA512d2ef5071abc86b37cfb10fa113bbc41031c9fd5a78650a4605e323cc1b64a61e0cdcf65f5d432e27041d50d3e450b3507153ac8c702985e12fa2c375b6fdbe91
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\BUTTON.GIF
Filesize240B
MD5021273150c9741eeb23c4d227a070be2
SHA1c623435f94651aaeb69cf76dfb92fc4e086f7880
SHA256d42b83a4c11b18c76f61175432b8b2311ea2069f4b792bb67952bb819abfbc87
SHA512cb0ea3aea5b5072e1946e7bf2a75f78e616477120ad955eb242d5aa42575b41d5e4bdcb528bcb0668985d060bb70359fa2fa852fb47443c0ec3ec91a0f0a323d
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_OFF.GIF
Filesize400B
MD541435ca6eb4c36d7bbaebfb2483a2e1f
SHA1637be5b2fd40c12a4e55c25319a1f93c1a1dec0b
SHA256004a10b19c4a3814d30f93213bda78bd24ff0e54199a59cb028991de3b717baa
SHA512f79fd2ffea99834873ada98d4e4598386e36bb0848d9ef637f95afdc315ca26876e91e96034745814616f074d05205f49ba2dfd5767b6afe76b7dd61fbfa55cb
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\background.gif
Filesize384B
MD5074aa27ab1a6dce381d88231ffc72f9e
SHA11970ea650f53196bf9c86a002975cddf0e2077e0
SHA2566bf45c20176a9794939bc2385f84a0a70716447e711e51e0578ca23d83424beb
SHA512784dc954a54fc9a7fad7d37cd666819c5d2d2f4ba773e565b9a4cd811f0248c68b41f0c292f7a410a3ae3f0a67f7efab2eb738a320311ac85e96310d87a0df42
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\HEADER.GIF
Filesize416B
MD5d687e6ef60af668d9fc4a44b61ff5d00
SHA1e66dc53fe9cd6c41b1802252e4e2e45c19da5d0c
SHA25659a13c52e04496e7a30645a2c7c583f718eea716d2a35b5d5492e68d3b21bdd8
SHA5129b701b7f397137f5ff7b1341833abe2100c9af1321633d3b630fc943de3c5f5871c241fd4c81e4e34d2cb3fe7fadacf981152a6abd6873214676297e0acbd955
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF
Filesize400B
MD59e7a95aeb0373f47bc474541b77f4dda
SHA1b1886fa085ffffc2330139f9fd201ccb74b617e0
SHA25655156457713d8534ea0a27410ca61006637bccdfa1f0b110d922dd18a13b2945
SHA51284b69e5b4d98c670de543863acabf4324f5fe5937035d4eea26c85c19ac6db9bc715c98ec327f37b5a913ac6273e2854fb0152948fbff19e04c2bfb645f2e55f
-
Filesize
208B
MD5e48e8b9a87b21be1e7818c2d02ba7a03
SHA124d3276e4d1d026af2150589d3c7e89ca3937dd1
SHA25603d84191fcc83d77480dd5e074b9e771fb9bf68400d09f6433dfb65920080cd2
SHA512ba3d81a76ba9ae4f93464274e4df202b44182ead7f5ac2eb04f8c7566573c12a690ba2a78ac382613910c4e52e811a6db84777218059dda81d81bcdea6121387
-
Filesize
1KB
MD575920187c5cdba6010005ebe8717fcdb
SHA18e2a74a1e33e9ab52d946fb8286e578d4c6aabbe
SHA256ce6d41500328f2a943402dd7687c5c8e8de5e524633508a070fc168321c429fc
SHA512ff161c42d2610600ea01598d1c307a8f13cc369a8049121d662243f117b9602d67bcb7469a9233730855c6db9de501c5fcdfa45adaacd608764759e60bac983f
-
Filesize
496B
MD5c74c7259381e8ed920b24a8a55802ee8
SHA1b3802b149c7e4652883832fa422d6d9f716ada82
SHA256b66214218d222370760338326767c8e620830fb3b87f26fceb3364259a216693
SHA51283a9ec8e7d6f3ade521fc1f35807f532ff6132ae10ad83f85fcca218c45dcd9e9b5c73841edeab1d1f99599d8b905aa015342215a4e18a05d175a7ed0a9f4f44
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_OFF.GIF
Filesize400B
MD59d38069f7d9a3a8f5d13e31018df4fb9
SHA19d285eb0f7659bdb144b2bced968ff0bf8d6b829
SHA2560e40146c33c85e49699deddca2ef2b4dba9c53f580331fc30a92bc8729d3334d
SHA5126230858fa6da1f00269a04ed8ac8e8995213cccae054450d07b2d9fa0f166e1f0d85374aa1ea1e37581c34368931261c69241fbe0ac4a72a0222272f16c1f88d
-
Filesize
512B
MD5988080e654ebcf6ed29f90e1b0f7d141
SHA142703cdc65003ee6f804b93e012ddda51bf82254
SHA256a2402a6ccfc97157797358c658d6a72ac1dd692549820b5c9a910a52434fb418
SHA5124e27f507dc7c14dae108387f482ede7152f42c4a69ac62250b0023a7fd453916732cb72d714e414e362e66fbad35513aefe095a6a1ef82de6aa4d927e7e1953c
-
Filesize
320B
MD5a2ce4a8dc0b887db629e66d991d64030
SHA16a1c50c40c2464962a6850149f1b1f0140722216
SHA25667a27f08db91d01db66defc22a90e259cccd2f674f670c8e8ef38751a8b83b7e
SHA512fe36927486b8ff33aa229c330c85e3a3bc838423fffd2795d196cd22160cc315a3dd3e520bdcbcfb524a1476fe402d0545148f1fb1dbf53d51403167db0301a3
-
Filesize
2KB
MD5d032b2725243dd686e9c2b65cd611ad4
SHA18935d47ca39206fb5038de78bccd8ed990526093
SHA256863e21ed763e5dfb32797680780cb7f294dd51f72cdedc897987fc96aaab4c09
SHA51285d0069c9fa518c9a3b18facb1ef067f9a18d2619e2fd3eb04a30be0e412fbe7dab54c827fa0dcb3ab2c211ffd4c5d52a4931cbf28c441d5832086f1fe82f052
-
Filesize
1KB
MD5546c0e6dee31a1305ccfd73aa5cfaeba
SHA178b417603061ab42d339e575c70f076ec37c5cfc
SHA256e482ac200373659d0a3aaffc4a917c133e296aec111214453e530638025b830f
SHA512e8d703731b7ff178cb936ccc3007285080e013a04a3b23cd19978d319b1f995c23c4eebc68c4e524934ddc5a818702cc05b2283d59015ae662f9c5c6bf6d6e20
-
Filesize
3KB
MD57ddd128676182448268c748e89b462e0
SHA16988716e5416808493beaec3fb636fe8d46cc6a4
SHA256c699f0595ae74e39c6aac871e548ee381a381e479e5cc3400dd114e4e1494d90
SHA51201f95d40ad17071f599965335f8172dfaa5c3e5cbbde02826f4ece52232720ea98b3cde7965200002ee56e33f6a4c6875e3c2a7cbde9f8638fa275ac4a2e9b87
-
Filesize
512B
MD5f91092d804fe34159ff1bb59722065f3
SHA1fece66671abfcc973d8ad4dce980ecd0bb8b8199
SHA256638a8395a1c945d09dac4c5db53fb67c95cdbf8a032b7b95fabdf578c1c84314
SHA512b2f6c64514dfe9c19bafd8cfefe6bc3d3eb4f25cf25546b67ae73d94cf3b93f28dba7f862eb5321022209413eb745bf3acfdec22f4f81332e247db35aa841136
-
Filesize
320B
MD502fda130252845380dc40440ffd5e03a
SHA11904722febaf299eafdf11e69ee674fc1fa9d976
SHA2569f3cd3dc76266491eb713b2d31d55ad375d5e35dadbdebf3fc44af31e88376ce
SHA512662caa11ff978f3ae01f58982b7b9636d09199a3d362d1c15d8e28274d707520ea1f3bcffc28d035674450677216f4e9263299bff6f841e38c7d08562562725d
-
Filesize
288B
MD5a11f9fabd24277d7077891590ef48c8f
SHA1d78a8dfaf9de658471b69134460db4ab705cdcf6
SHA256e8fcdb34e5e5e770d6be4eda0ba1f5e1fc8028c6e2bf7ce0a7217fbb23276bc8
SHA5120212755a5077634b5f2b2bf88aae6162e2986bb003121e54c73f048b6bfa5710f421b1b20fa0a2b44d32f5408ecd9566244a2a007fc6d64762f42c5152a722cd
-
Filesize
416B
MD55e575061579c189347d170f3c3272763
SHA19b5509e61837bd1814ac591928bf5060f9ecbd38
SHA25600a05266d099060fe277944348524595bc5e8fbd5aa56aa564d359fb44588747
SHA5126ce68f16f925a309e46cfa7a3e4e12c4beaff8996eb172525d993d73fbe6b7a0ee546342c466d03aee71932431235f3a2be37a55936001e122be5dad750b479e
-
Filesize
416B
MD562b684668ab3bf2a1a0d77c0efdef6e9
SHA1ecd265e8f2068591897d043fe1f3b9a28bd6fb06
SHA256ad1877886ef0ac5d159249ae2c6d67f91624eca73acdd6821442275c5e9b7ed5
SHA512f88f90779ad7beb02892b44f6884819cd8a7e78cddb3c626ebd125d3e7f7ce6f5766c5872e8fe71b28103ef9d29a9cc3f42b4be53fa738be2fb3f74264caeaaf
-
Filesize
400B
MD5d72135eeb5a5e2f4fca6c3d4618aa029
SHA1532257941c46782eb9d4ae65e523f8c5e7939ca1
SHA256edbc0c8767de2ba8cbc43536a4f115708c523733da6a93d1c701eac7d1f69b1e
SHA512f370c4e4b6b684f6a06c9105893596bf4c00ec7393cbab2d337ab036f29606d68f489ca10b8e89f72e9c62305bc238049b860d0ad8cf91fa275723a7495ec8e1
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\background.gif
Filesize6KB
MD536dda1f76e64ea47db9f78c90e07158f
SHA153bbc52765976156f8a0a093df47e6e48f114e09
SHA2565a70aa450ba5a586545fc3c46b041ee8bc50852a0d6ae6129931973c912ef6a1
SHA512f5a2561be05d11aafefcffb9230e2ea3ddb39018e3139d3858b083127150b2f78de5034161958f92a8ee24acf02235ea1900f182a8e4750f5c384c84a37ba289
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\BUTTON.GIF
Filesize480B
MD5a946579b3eb90abf7320e9978333a059
SHA1940c18228f0661ec6af68e62f86a1b9dd9c2a918
SHA2563c337729900dbed8a761ad7a9e5d4ce26ded027d336bea4a569713a754bddca3
SHA5125125f42a69f77fda2b0b38e17d485977d0ff74595f2cc3fbe7ed0c6aecf3450affde681b15d594429a560de6e5572db948ae338097df92aadf49dbb4c35df801
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\TAB_OFF.GIF
Filesize400B
MD5f9dc7039b8cf8b0a980260210da6e90f
SHA18ae5dfca94a78772f501a6172ac230e2f4402630
SHA256261d38b3fd7810f32c59e7c58898f2e2cc82b81c507168c130876371b65fc6b0
SHA512d17dc1522f3bce3d77df917f7c015376438656f8b09ea586d707695df6f27b9b4ac85db5c7d5f7faffb52bde14913b70a8cd132063c943145568bae86a52b471
-
Filesize
26KB
MD502d1509bfe29725d590b95923d0f8076
SHA17c6d23bb7d70f7353bc51fc517420581021a0b2e
SHA256ecc8eae1cb51d64667b74af629c96e4dc1e0d8215901a93c85ec78df9a705247
SHA5124ccbb9fa52733d94cb639e5642361e01b68aee87aea534c6e4d4e6b1c8192f1d25d930dc69649a2603db0bb1cf4fe3280fd16d8df5dd44a730262c28be643387
-
Filesize
400B
MD5612af3d1122ace39219c23f4145ebe19
SHA14fb4ba9e1b48cf08206660183b10ca088f05a4db
SHA2566a99599e806bb8d0c5ac7a0b7f0605a3c74f5e21bcfb69bbfa9776fb09d7daad
SHA51247436b0307ac1fec6dd7ea36776688f35985488fbea4f701b5b6501d845559805635d6411ffc01ae6f0f168f156e2c292b96a1476678c44991126745e775a953
-
Filesize
176B
MD53e633af261d3f8b674e5da45ffda700f
SHA175716b53787365682f6219b0b012c2531c1a244b
SHA2567dde08a639e447f1d645013747bed7575ae74f76dafb9cd813dc34c661252848
SHA512a733e027a11c23d814348596b0e26d6a7f312142c8dda3e63a5ffebd6e723d70a01fc4db9d697b4f5d0fb6973915d855c58253a695a1cfec4925280fb5ece31e
-
Filesize
176B
MD5bd34a2929a464c0529d5282480e3780d
SHA1409f7cb6bfcff3418834282fb6cee3b46526c365
SHA25684aa3d1f6f0300b02a2e79b318f10c23796729d97db4ee703347f55a10c55f11
SHA512fcd7941f3fdf27cdd8af6f43d495c1592ffb155a505ee09f28980097811518e77819e3527f90b9a6db9b6a5dc88630aa21700a37a5376221cb263940ff182026
-
Filesize
176B
MD540862c5cca0325b2fc8f32ec89fb82be
SHA1a28cc0a552c8328889eef72a06da8c811c6e83e3
SHA2567f151baed7d97204c2311cf1a8588c7f63cb8eeaca42234ecb4ba6600bb66456
SHA512789066373454a2377c445a42919aa5860d2006a65e3e35e7d1a76b09b551785cbbdd389c00cdb28db6f1634e77ebf2a1d8dcc878fa9e71eb1a22b45a2c8ebc91
-
Filesize
176B
MD5bb5944009d2e0f26271c3cabe14cc721
SHA10b2ffa945bfb404b0e0637f84406cb5cf709d023
SHA256e5092d7981ce72313385c23b3d72b7b121095ac76e2401c5df4d5d5c34cbd41e
SHA512491efcc3d89e7d28c6593d3355cd3b4f3e63b453a12e4462a6590c4e93860a38e88269bc469f85d8dc377d67332573f8304e8539b13168f2a3f38cfba294fd24
-
Filesize
176B
MD5b63c223774555b59b365d1d5b96a0275
SHA139eccd45349644e62f97edd52eaa168865f3f981
SHA2564425baca3b7226db16afe36250fce586a181c7cd15d5c9bf5c8d4c70f3c2ed0b
SHA512b33dff004209256b41c666e7cdeebfe772e106de2b0ef179da1547576d304ff7877af38c19036c4961163baa9c9bef618db6b97e71d9c8f6b075534e13357640
-
Filesize
114B
MD5b8fbbc73ddde31636552ab184b4e398f
SHA15cfbfaea56e979a07c083f2340b10a5894812d78
SHA2563c3702253a4695b5bcb18a2565b1d49f9f32f5f9f2442fd1395197970fa34edb
SHA5127f0f4b098e0d37ed403be8d54e2dcbc603791ddf00e3a21747c41ecfb829fdf664b6bddda8d51309e1229b197244a1d8ae23e1b3bf3348f99f84a7a8684db8d7
-
Filesize
176B
MD5d2ddcb1955e2ddc9207f363e3eab2346
SHA1d5b5df1e442ea036b9104b7b51249e506f9db781
SHA2563afe75361dec965ca7152137bf31135133ab91e17e000244d3ca53ed227a95ee
SHA5126c2f0050e50b7c92950fa5a1b3d1f5fd08507a33c332dd18779d71d2aec18a05a9ca7b06d698b29a0e08f008cf1de418c891258eb182449deaa9f155261fb90c
-
Filesize
113B
MD5db9742e49c49c505b293a84518e95fa5
SHA1406dae0b226900aad2ad2e10d8366651b848c053
SHA2561c17b95e5098adb0c0e06aac8a8c7c50c6a5ef1b696465d548c8a922f1d3a653
SHA512974917a72b2b3b783bb0ffcbfe0058489ae65ac0aa71ae86d77195780aeb7800848a3158fbe7ad8ddf9b30145d8a1a2c66f72484305ccf363b7981f105be295b
-
Filesize
688B
MD59581ff2b4bf1e216613b128b36b84051
SHA16a1debdddb031698be7d45a3a82daa27a7e9e63f
SHA2560b1b9654c295720716ab1a68366113d74a0b256cb7f457377beef3014423944f
SHA512a895cb308d5ee9c89edf400ff9a6273212eff75c0f4fc9f2f42beef10fdd00b021f8d8736e249a9443409f935952880860ccc38bae9ad8a65b97d2a554cf4908
-
Filesize
928B
MD5bbe3f6f8ff2b3a5fe09ade12d3cab6b2
SHA12eaa49c4f91a1f0d86d5293ef64f8e471160f302
SHA25659ed989dbf5fa3bb392d0169904515a4fc71ac3a666565041350b99a34dc8847
SHA512f841ded855395a2815e54d1f1710a73ce5d329cbb775101301d4790a35638b002bf703d29ee7854b694f65b21f27e8dc7e3f473132de5611bcae325b9e690ee4
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\TAB_OFF.GIF
Filesize544B
MD57477024fe4c31b6005680a557b575f5f
SHA19464d7e89933653dc2594d18316c2ef66de1870f
SHA256d31f1292209eb0c99074d528ae66757f0215133845e778c4d6374e36082b93c4
SHA5120df353f0a522c2b4cbd5fd568068b2e6ae49456a9ad2f65cb9b7ce982dcd9d1d981e2c66962bbf087fe9ff71c797cfac0c2bd30ebe560723e244337317406ce1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_alignleft.gif
Filesize896B
MD57d8eca0e07741cd6719df50afacbf259
SHA101e212492b6efbafd861ad1b0d51c43ce7e690b1
SHA256fde7003b5698965f4bf2393accb2d09b3acadee3a7fd9f5665d966d1c0c6a74b
SHA51215ad462c906acff97226bea7bb8d7e44c73cc4881971ee76cffeb49b18a7050f91c5c7a71b26c93222d3571fad3a53172116a2478e3b5ed5893993914940fd82
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_alignright.gif
Filesize896B
MD5e0f78f4f201a60da11ae6719e8b687cb
SHA1ea4e05ba64b07387a0a6eb090e9c38237416a9a5
SHA256be172711dacb4e851dd608e04d4037667e030c79ce15f444843390ab9eac519b
SHA512221c00c6f55382fad7abf0b8b2290dd16027a7e48a41fe859e4edabbc8977abc02b0eaf13284484b4e86f9e88a4facfa6f7b45bf3ec7be5d8b2d20dfaef81365
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_center.gif
Filesize896B
MD5c7e9188a2b1c2c786e48e337cbc7e111
SHA10e2e1b192bb60a6eba184c2f5e66e445ccc56f07
SHA25653b126bf699605dd1ca238bf6aeffe8260aadce02ae2c1f3bb29151009db4cdd
SHA51275ba97fa2956537c9d96fda1c8a7dc504f0430f2a08d7f5d5f28b1aba3828b98a8133261888f03476f52a9063c65ee5c3e130a2290ca1284b799b15652f40e67
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\TAB_ON.GIF
Filesize272B
MD53289bdde380cb5b7b320a8956c96c495
SHA123bc4f0927e591e359a8737e7a7c83add594b79f
SHA256f8556d355b5135f8747067e194ae933527b61558b841576331229339d8f86a94
SHA512e46f64edaee42b3933bc5aedf7f258e02f6ebd2fc9f062f79dda99db7b014844e74d5e6f44a0d222f21a10f747dd2bba12e7cafc0786f5b2dd43b92eb9e2eaf8
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\AddToViewArrowMask.bmp
Filesize2KB
MD589fc69582abbe1a57f7beb73c7b8ef50
SHA17ac8e99354ff8c62e3e784ee2b77fe67eda07737
SHA2566f8d5dcbcc68888f62cfcb9e8842a62fc7ad50ba9a6c20fbdd15d02f020592d9
SHA5128c5f562c3c5a20915d79565c6df7755f22b24f7ba6d8d78debe57331b0f61482c1520edbc6cfa5379e432658d38d17cb3ed2ffc90c56dbea3ebddba9de54aff7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\BG_ADOBE.GIF
Filesize24KB
MD57dae889cd8122a74c8e6601aee944f20
SHA16aba8c15355dd65640189c939ec24cbc45d8cc37
SHA256f8d559abf1b3dcede29455c6fc26fcc8a19b4bc375d00de462599be53f3cf97c
SHA512a05fc773f78e889acd498e34fef345da310f565c25b616195cffddbaf79741ef8dad2f23e1c2cf629d3d8bf69bb5d9f920c82cc0c4315cebeb3f38d9ac80bd90
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormToolImages.jpg
Filesize7KB
MD55ec9f5fca3fdcab172c12975825c0513
SHA1747d8bac84c759145b6160a1ffb1bf498df5ba22
SHA25641a24078823f19e138391df7ae7885f5db2ffee2e0ac9ce99fac1fbe618e39ab
SHA51253ba22bb27e0cf0396394b06624af567d10ceae8729d42b89f68e44cde29873dd0be43912c7d5793ed9173244cf4b512f84714ddd5789653d032e00d2328b18a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewAttachmentIcons.jpg
Filesize5KB
MD5f0a470c037cf1b3e1035802536008acd
SHA15bcc11a7ea1780546839789f0fbc3a05810ef5c5
SHA256c715d9f70d793f388710ea5675bcdef6b156d6ac4d12dc31bab3a28184a16f3d
SHA512b5f3c9f30b04a260835659fb26a593a009d8b33fefb4e45662bfa355fe72f91b8a4c2fa7cb89083fa257f4460a44026a74205cba5c0bf1590a72bde65e450353
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewAttachmentIconsMask.bmp
Filesize1KB
MD55a0158e472b16165965e04fe29415b61
SHA12a81c71ed584ab401be8adf104f8512449685715
SHA2561184e6228b89773122d15c2891566a531d82e710119f5093b37405653ee7bc78
SHA5128e1cff308f6915ab9887340751ae2fd782a6cff7b286c892b2221c253348492d6b9e694db80975bbd26199fb904c99a2b33e75d29ebb6810a3565a1bf6a17897
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\attention.gif
Filesize2KB
MD54661755f682d6590af8b7f21b78d59cb
SHA183ad8dc60419ef834a8aa212065e4f6b3847a3a7
SHA2561f215a9e804b804f932be49e0ce0d909e5ebb56329c787eba49f4079df217ff9
SHA512e3a2524bbafbd0305a6800b00c1267c03e2b92474b21858fba8846b18d4b0d4f4188a3e7d37af7e8c77e741c9c93d14ab0afd6f689568d3e81c275431b0462da
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Casual.gif
Filesize5KB
MD56ada4362a00b2599f5ca369f9e99a5ac
SHA10e9acb943944bda0be08792089105c6789d1d7b8
SHA256d22a00be72d23cc6e96f235bee33593b7e0e95d9888a0025d006c0f1553cd117
SHA512ba4e8e4bb899fba342f3e8f95fce72545ec730685f09bee1c753c62560aef1c26ee89f642b0a9b8d1ccdcd615c2b3267dc6fde6299a554360bf9fe48dccc9f53
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Country.gif
Filesize31KB
MD5c31c9774b2a5ba2531d1aee943a08343
SHA1db0bafb941935d93aaf923816d067ddd51000746
SHA2568ecda9f7eba3e9a0349611a3a50ec20303a57d6fad6b4564e4c15cb58700b614
SHA512bfec16b77a643ff91011fd77554e18c3588be2bbdd20538fc55ad8a3734118ab123d62b7395ab33cb5ccf8f7987a06c50aa4ff3e55cb87de88fe27b586c9b7b6
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Earthy.gif
Filesize4KB
MD5d3cc987cf07b21af9e1b5ecbf13b7b51
SHA14dc427d74826948cc2823f1a043cbd0a58b98d12
SHA25607d89f1128829b12326b3ea5516dc0371ce465b681501d3744248da39efdb914
SHA51205f950f7d5adefad7b07436e536d0961e5f3d7be4568ba524dfb4c94d96da75fac5565027820245b9c67dbaf2a2a04e5784b083d7b290eab925872bee8f6ee7e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_FormsHomePageBlank.gif
Filesize19KB
MD5cfb4e8370fbdd2413f11533eff673ee0
SHA17d091ecb9353a18475825305b4ca237571ae9e07
SHA2569d0da46d8215af023ce24c334e1e449c037e2ff02233396382a1c3d2c64b4a68
SHA5121a33d2ff36402181f2a36f982499c01295238ecf42fa0a5cc793a523111011771a1ceb592548efdc0b2021097cde91aa023422467415714392b721c67bc5e0d8
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_GreenTea.gif
Filesize21KB
MD51159c6578f771c1b9760d69f1862066d
SHA18877dcfa123e87a65cd62185b3d9e21af1e4a7bc
SHA2563ec8a2b6b45f82136b832d457b63cbd4bdb973c006a9af6365497100da60b886
SHA512765bc1fd4a15c2920c16b2c445b1cf0c53d4b514eff3b6cd74d474d7651e4093e07827aa349b95306c28f672a264521744a605859a70614521706ff735839e37
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Groove.gif
Filesize160B
MD5c5d817ec381aa9f1da0ca06b59054928
SHA170c214dbc5fce4e2aa9bcf99b1ec1912d80ef847
SHA25671da2abb4a9c4e0b74f1674aeeca48eea3ba48d915edcea85ee67bdbb064a991
SHA512ab99308d7b225efcac1acbe7a9540128d4baaa3dd51719cf0ad9c067bafd38d66cfb07baed9f057872945c9fc825a7609b473dbeffdf5fb426f033f720e2d206
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_LightSpirit.gif
Filesize8KB
MD56664ec069d89cb16884476efebbd2934
SHA1d2a2a7553ef7288ac859de6d3d2d9af0ae072485
SHA256b44d48a8abdd3efa8870f6bf37b17a0c82577173871a9e68756877eff30aa6ad
SHA51209b980275cec4273a8e980634f03b6188653de49e40126d3b1da296ba5c6c72a095fc6e9a2b4831d15b93ab3b1bcb78d331f43e7743be29aab78a53c7b76dbf9
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_OliveGreen.gif
Filesize15KB
MD5cf5119cb46fa859c5bcd9a974c97473b
SHA10038ffd58eb1b6d6182168dc0ba0bdfc45aab5dd
SHA256ba596ac69aa40e0fcff0a6e43d1ed5bc898352c21e01318268bd5579f6013c57
SHA512893af7df2f6786156d0b64c30f12e1b091d706f539b90c16e3364cd4ed3f84a4edb564d64635de48bd35a2ed6a6e2191aff99c209fa1a3cd72eb12a1017c1bae
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Premium.gif
Filesize6KB
MD586f2631594941e9da3af200b46927941
SHA1c6016942f567f83f7ab75cdf914e383d53161916
SHA25655fe9ce019a239b2205ec338fb21c8767aa56ff9e9547802212505db2f048d4c
SHA51231bcbd10fbb16cc7a23e135825f8c2b27cd9c837c0e1ddb952f177c5d7781a378302b9e6f8ab1a60eb810df8af05bb883cca56f56ccfb7316dc837a3fdd05054
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_SlateBlue.gif
Filesize20KB
MD57d1bc7766fd197d11d5146cc6a6331f6
SHA1b83129e522714b90eb58fa53846c84fc8932d3cd
SHA2560fa3fd70f53e6127e45b657de2ce7309a4d7fa8c978a30fe5203ea1c550248f3
SHA5124c1f973250a71f4696e74f35ddd4ab6927b0b65c5e85495bbf1c5a0f88d75980a7547a8767691bcf2ad3d813dc9bded8ebeaf3a1150b87ee0a4eb6f7e5dc0d17
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_TexturedBlue.gif
Filesize6KB
MD5c8ed665cd5ee422cdc1ab417b868eeb5
SHA1c061734d4e2f1f82b809a331c89ad8c9bd41189f
SHA256bc928423e20779bcc92c72b5fe55573fd6be784e01e33a86768f09560ac0ac17
SHA512a426c5242de00f259fdfa7f10fc08d61c6771d9a6ce0456e01ec961e3fdb2c66b94a369c771eafa44241bf2ec237ea434e3716e17515438e8f8c2967d585b0f7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_VelvetRose.gif
Filesize15KB
MD568a7a7d2db01ca7b33bcdaec05d600bb
SHA1b819de9b25db45b3a14db02fb514beb324cf52a0
SHA256364262979cb5563773325c4ea3d8c935bc6f55cc32b82112dc471596b7ec0eab
SHA51258b36ccc9f0091a4da932469089aa776e225f7bfc82d486b5ae255761183322df888750193ce31b2226cbf238aa7e9454ff865584ca42f4bc794af75772148e9
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\Microsoft.Office.InfoPath.xml
Filesize247KB
MD5898aa62e2203c47d74e8af608703d06b
SHA13372d32aab2e84f6688e0045c95796906d580c20
SHA256bbe8ffb2ac832aac6472bf4e881e44b3d69e40775fcdb6cf717708997f930c1c
SHA5126ac437781867645dee1d76146e8240b4e314da739413240b63270c0056a8784ae7ff41d027b20c23843a4b45bb9c73c544e4db069cac114f664aacc27903da16
-
Filesize
3KB
MD54bc018607467a6b31437260b800008cb
SHA115ca4476a27ddba4064ede55cf4b03e56b7c9127
SHA256b80780db1dea105e6f23317d0b5deadaca171713365b7a249d262d690c1e3f1a
SHA51230a4fe3668b6f759c5954a9104ee695693cccffd6e99e07b98d43bbfe9e3ad3d7793715bfa7992a33c0430bcdd11264f7a13afb08b539bd073c732aba79c8883
-
Filesize
96B
MD5787166a1e60bd2ba6918e4a9c7ab66d2
SHA1ba43aad8caf00beba3400bf9a5818e0b4067f7a2
SHA256978773a7db73bd6119a490c12dd3b65b0530e56200354c87fdfb6a936519bb9f
SHA5125fd1b9d334abc61ba1d096e09428c8d52457a8f25bbf35e3f1e4f2286e1249611a4a086c838aabcb1031ba7fbab90ab455045b4d84ea483cd991ae250eda533a
-
Filesize
173KB
MD5995006d9d2a8ca715fd23cd22b03e48c
SHA19a9ac90c4fb341856bee3271c438f7785d2449ce
SHA2563db39ebdacbd03d0e59f01de863b19bb7dcb67de3cbc99d0cdbe5fae15c9c6eb
SHA512159f41148889181ed325d4b79577666c38f30cc2d82e0dd03decf5c94d47cb406968dce8f3fb916a2f7f88d82571b64421ac8ca22ceee5262c5b13d8e78b8cd0
-
Filesize
809KB
MD5d791ca23f426ba8d591d4384e04a4890
SHA17fd37501e9dedf1cc8646b1f0077f0889f2f6143
SHA2566d5edff0ae58f57671280867ccf81eb7f6907482be26aef5c2284b8c00a3ac16
SHA5123e4fc9a784fa90067fba8921a0ed62947fcff647d8bc91d40c6a11c990bcea83319648a41ea00d8bd2a9da676353fb9db3ce6a607c8fe5afa0ca2c9f66309d00
-
Filesize
1KB
MD515665f5dc00d38f0cb920025d23b5792
SHA1623040ff5cc7dd16a78aaf9d56677c7fe510dbc9
SHA2563bc3b60bd14010392a7fb6d2e17c3abe98f5ed1d8d942845ece72aeaf17bfbf3
SHA512fd949638e1cbaff5a3ec269f6f561a5dc9faa2f9ca464178af0f426226e3e9c6a409475184b50469a648536741b13251de6769d65acc2da178746a8ef2478b39
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF
Filesize192B
MD587c34987eae2842adf5eb463b0c7fb0c
SHA1c2813239203eafacd706105338db47944802d8b5
SHA2561bdb91573513164749ad374eeeb11de51e889f5871748386c0b87c8ad5d985d3
SHA5128ed80921a4305696b9557ef7030d87a770ff159e999459e35c6b58b01bdce19b2e69b1c186fc68fa740b71562beead78018b77a494843572a3bb41b3230b81d1
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\ECLIPSE_.RSA
Filesize7KB
MD505adad4c258afbbde231a241425e60dc
SHA165deea6cc9fb50af494d46bde480b0456dc6b7b4
SHA256f7b6392d1a6a4a636defaf182feba54f720edceb4892804386709b2fd6bc3076
SHA51245c2cf6ea6bcac60763a3b578a10291bc1b416cb01b11c931afeab84cf2040c6e3fb387aa2e8fdb51448c92871b959ff2cb8dbeeb881be2fd88fc624a47d6c4d
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf
Filesize112B
MD574deb5d693238d695b315c1b9d0fda32
SHA19d1c8c8167785254537f29b20c71e1a4c399dfdf
SHA2561ba5c026d68bb236ffdf1e9094c5e2842e8d20c4a401866657e0b156dbe1d26e
SHA51287f486ea4f3689a9fbf1c29770fb39bf705ef45d060e89b1883949a853f879ee71198908c2749ce29b89fefd5e53cfe16b4147a152aef9cf79d2d7bb4116d8c2
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA
Filesize7KB
MD568e255382787aeb6954b891611ae0451
SHA1c93e9918a4b6041dacc16bc2e55a10f0251cc1f6
SHA256f22d77f57dc5022e4c059ce36f3de1d97b6e7d9b2ce7dece578880f368eeac0d
SHA512e4e41f0909741aaf69fce1cbe2385f3d893d37b1cb6053a3a80f58792442347b583709c7cc13c3bdfeffa9dc5ed6a1838ce52d6d63948c2fe393d670042669bf
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\epl-v10.html
Filesize12KB
MD5b3f83ca8484344969156d056a4708591
SHA15bf77510f3fdec2b2f2095643e944a89ba065dcc
SHA256469af85f985c64a4fe670298582c88297a0f3f4191dbed540d23b5078f9c3bb7
SHA5127b8b66bb60fcdacf01e96b186eb942a2fb026f8a5e01b5036d859c5bd9fe164f399b038157e373192f8c8459ed825826e11e1880ad38d984d035f45f43d54dd6
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html
Filesize8KB
MD5952b1f5d3a71b3c0f51a61b25cec4cc8
SHA1882b547ee5c515cd7f9671bb7eabe1895523ea84
SHA2562977cc47daeeae5c4dd00926e511f33d8f7deb6a3b9d2bb33926655cf05d16b6
SHA51282dd69af595cd520525bc06677858ae074d12034916eaed5446d8800ec9c9502c564975f210ab50ba85051d38abef4ee41e41b21f02b3730384851adee860a28
-
Filesize
173KB
MD5c70137fb6d622a52aff9ab024694c082
SHA1b7add2f724f80ea7acf9654be2850e79fe919dac
SHA2567be125ac321b633f5bbb9ac70ea8fdd41fbabc4e1967e24bf79fd3924c1c1dc9
SHA51292d83b21e5e85389a9352adae6f1b8b509e75731014d6c1b3c7b6acd1a16a1b54bc638bf9e1eefc252306b96f43c72a6e2d00d90620b594f7c9a9a248bfb10c4
-
Filesize
11KB
MD5c28f51b31f439e6d39f9b5d6bc3761ba
SHA12c45a952d0ec5796e334d2e8cc461c3764f9100b
SHA256e0767053e637febe3965cd1ef6eccc236399d68858195091ddfd491d6111a060
SHA512348cf663db5dea075f6381c312ffca06433c0820a05c5133335483ea8d9edc3afbf61c9b0dcf78241ec9d8d2e6e219c47fae4611aba7b833ee4c349dd4d73e43
-
Filesize
63KB
MD5e9210107158915ea9b146e2473d67b9b
SHA176ab96780b55a27666cf5e9eb36513435d0ba86c
SHA256162dbc63dd97cf843daf3c4df9c7fc8b21176722afa2a8be512e7b05368cdb8d
SHA512bee19ea0f609add0adc1a4fddaf663161140b388d4a4a884e1b4eeac6179599ddeb4c076b48e45b69bbcb47769f75137db85b6e7f9385f0e330a0ce6091eb095
-
Filesize
1KB
MD59032a9d1710b712193131dde501b4e51
SHA19b633b6ed663e7d9aca824fa3f05dd10f769ada1
SHA2569e142b00110f38ba925a6f108ee3e79a1121401aaf687096d7848fc61aca426b
SHA512f325236109dd78e671f4c691df60013833b75ef9549d851e6aeb657042645bebcf3b9df09f35ad1e4e9e8060a32695d194fc33b4a55d864cebb72f37fafbba5e
-
Filesize
12KB
MD5a371b0783ce3d807f9fd6a034d2faf64
SHA19a3cb6eb41218c65bc9e3d6fc43599eecc712707
SHA256e256fa4f4647e70184f8587f321333788daa22756cb62d77842aa6eaf000ab3e
SHA512baf8305ddd9414d862efef6ef4247acd10918cf50b6d8b7dc8fdaf8489c83d6cb34192cd034ac331d68332e9b23777f830f0e75057e09890f58e97ed9094d41c
-
Filesize
36KB
MD578b68c453f790a3851305ea8e342010e
SHA139ee87a1a149ddec9c3863a7c1a564e7633abd75
SHA256dfd75407120e049da1f336ed2e806f1e9301a967b339e4ea3dde41d7a15e765b
SHA5125b5d7c3b62057d49e8e90c34f16120cb484a169deaab24d8b68d537203ce99a7b71101ffeec674244718b168144254443b870ac1a1e203602db56c11d4386861
-
Filesize
944B
MD5bd54ee578b5c8d0d65b8122b7d5c8df7
SHA13dc6a568787ce9074ad03ee28af8d4f4c186564d
SHA25620140b2e51a989fce7a7980ddd4a33d41e93605ab106b873d764a7a543aad523
SHA51206282aa3df72098a3d4aaf4d8c7b40d0b26a8161dbcf0d4cf27c886bb8da077a85c53d25107c949ea2a57ee24a52dbe5ea156a0df0e8538b9ab48ced93ca074c
-
Filesize
11KB
MD557c92837637492994c7ef75458e4558b
SHA130319cb74386c86d2b4d94126b528413cbe97c66
SHA2562469bf4674a25a9fab3c0145954d4cdf8c4300499871afbd477a436ed7942eae
SHA512e560ccdec3c65302f24793f0860be6a9d3dec5db7f1bb167304f8f8d82197171434434c8ee036348efdef0ae2bdf46a961e7dcea69cf7480d65459e9bf22d388
-
Filesize
64KB
MD5aaa2e69acf712a3ca06f75856826ea03
SHA1afa460a02aed6491ca243f6c8ebff87f55f04cd7
SHA256594f99745668da8b69ea7d0a4ce72e04467159cd221850dc77ffff356e00a507
SHA512647b624616692421b61cfa8ebe283ca389a8c6f5bf70ef9819123aaffd7b6b73cdf8d97122f8fcf2b59cc9e161121acf489cc76184d2d7935bf70c920858c799
-
Filesize
1KB
MD5e60a8c0f3aa0ab7a66bbddc532e81f7c
SHA10d38db47bade9ba0b02300e9c8bc20b76b762684
SHA2561e51cde555ad6aa1deca34f3dc371deb6601d1b1653286ccc7edca0aa85aa118
SHA51291b3dc02611d838f87ad1fbc33ff1cbef0447f855efea1892bf30c6c3007da53c7603bafc214cc6954b412350a8b428488270f34ce6a5893be7d509783755dae
-
Filesize
6KB
MD57bb61a2c11a4e3b580318a05faae50a0
SHA1c32117d556648e5889a864039f03bb7b09eef151
SHA25693143df780e6c3dd02b25258068dc36c55afa8e6d81ec71584a5c28b9f1fedf0
SHA5125efb620e523d68b79ef7c6784663e55f02889aad3b4da1a890251d64ebce7ab8249114119e0f2e10dabc7c93cab7614d1f17c5fd20bcab9c669939230c28963a
-
Filesize
67KB
MD5491e0522c4951d6965b6a1fc27e5891b
SHA1ba350f468b75a0a32194f81b306dc5a5ef452d65
SHA256b6aa8e6bc3532a64e132c95df18a7188a0940e3b1fe66a9debd83da80b64bb80
SHA512b7f2f13b0c93308ce22d13bde8e0b5f79b7ea1c69e57e091e393d6f23606c2180a31798fced4aacaa87afde0b474108fd7db802849da663ea052ea0d137594c6
-
Filesize
2KB
MD5ee488497b87c548e3e50b81fe2306764
SHA11d9f8e24699715f6bafa760d59ebd3cb6b40f4ca
SHA2562da722071b17533fe6cf7504eae080105fa01c8cc08a14a6abcdb706e4604fc2
SHA512decb1e79187fb6ddffa5ff686f2f0dd4c60eedfc44b666f4a802fade96db1f2c3abbb1376f3128536c0ea0cd6a9bd809479f54cd3d608946c1d7d37f3cb135dd
-
Filesize
6KB
MD5df362f0caf1c711e9fee975717958d76
SHA1f352a0bee613e82688cae3996554a821bf0045f2
SHA2569e2d8b39b758ab1f5724e0c8238d61b848b49d7af13f127971200c5e2680efc5
SHA5128e3e795f1e79a52ca7605a787b8b258a669047f595f6fb257e4d6a36f7e563ceb330bfcefb87a752b9cf86ed5792b21ef2803a65905fbd86d1042394526172ee
-
C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi
Filesize148KB
MD550f27b9801aa1897fc8bebf40291b99d
SHA154b01aab32b9b1422831984ad76ec6fac6cc209a
SHA256ec772420d2c998ff22d1ecfb92fae72d87de0c681c6ccaab92d21f50eff744e5
SHA51208dfc3724ac83dfa7a0410b9bb3271cf4b59058f39b430d8540b9769d20c22ef7f877ac2e03662fc62ea13e6efea66146ffa41c79e3a4bba18eb30eebb8d4bb5
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52a1e72b4b4e3b380b3c40caf334fc493
SHA142b73dbbbcef2fee98126cd51c56f943f4f23287
SHA2561ff8bedbd55d8836e8f5afc2e0a8d072cda14c25bd01909b06141cee21fd2cd5
SHA512b73c6fadaaf619eab1e2eb2077320818364c2264b8d8eafe730c4610f8b56637466adda5bb2edb85ef9371addac23e3bca1395f40b062980a3c4846f8104bacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5202dd908e16915d1cf2a3190b9ae7
SHA18b4c861bee1353fd9e1ecfda39a4bc65308773bc
SHA256ee0388ba10f9e65b116c099bc4962e4b3dc303dc3fa0037c0de15f7f2c79973d
SHA512f59d35f9543dd6079ef9cbd717dad2af3949e1f810fe207b5508e2cc2dddae559146ceb8574685e36567f32e00d7ca67bacf5abba717d1f3a31222cee62c6f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d164edd549a9a0142b44002079fa0170
SHA15258a326acb590934318390ee3a27c023432d402
SHA256853bf67ed612ef757a1a226666443e1bec81e1aa9b3ce23d51c68266506b0979
SHA5124bea7f7bdf00012af9097db1fdb7e7c874e9e48392fb14ee558f4ecd0dc436b27a75ce6537b9bde83542901f243e48ab1e554994f09fe0f4da3335c7c0fd5ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2910b56fec76803799d5f35dda09055
SHA1542c35380b4b66ddc6264806653e106c91f56106
SHA256faae06b57a50c6e83e5267716f6147df509d73ecde6010e601cbcd94d432db32
SHA51274bb9e643ebdb5644ca06d2d222fbac342341d8132b0485393cae9e975dee6d7ca0add76ec2a5c60b493048a2eabe837c82cba5cc3d225099c5173e208a6badb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6570828c5daf8b5e218703c73815b95
SHA1535e57a26179f9f4c4ccc7a4092e666eb6cf41fb
SHA25689a0cde965dff2fd75f5849fc292297dcd73c93b881b2460a1eb1010494fbcb0
SHA51234b1f86fcbb3d111eb170e3b9961d3cc85085364c4864cfc28d625bbde11a6e1c71977b38216d1b32dff1bf3e32eb23e04e24c9ee1bb2c456fedd2ba6b0c34a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54026010732bb63291e2333a8bb2aaec2
SHA19c82ad2582710931a09812bf38d2f9dbc0606f07
SHA2563d5771073ed413568944a0dde43111a7fd57b9f81da13f8d8acd078cd6cd4574
SHA512ebe933478b37a47247e5cc4adf80c045e4a3c4e9822909f8fc263d53896f35d36d856bbaffdab2634184098fc12e5a9c3f1544bbaf10b9f6579a389b94eab2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519aeb071d0f1ab5b4923b0d439abf16f
SHA113aa002410544b875284cd384cd02f7eccef4f9f
SHA256552ed2efe6abb73f7df7d08dfbf053bfce20d3a1dc03fd35f598e074a8ea0597
SHA512a4b654c10fbf782513695f8ed3fc72bda7b5ec61d5dbfb7b79dfc1ace9fb6bbd7fef42424376ba1353dd50e9de63d33b5193625d435a5f09f21326b04b7f1153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e00f32f4ee43e4f2c2d854dc156062
SHA1a6bd1b590261ec50eebd36a9f3a9e4823687cc40
SHA2568bf103daebde59afd9c6f5b9f5d17400e3a362a9bdd1f55c7dda73ae4769e198
SHA51283c6d122c12ad76dcca028fca8ca668cdd4ecb45233805911bb55873266d4ef9f27e2dba55a1010ca3cc0d96f82006792a410db123b7d64caca551f6285de23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f5a0e06462a39dca90fd42099c8cc4e
SHA12c2ddf972c469ac5538a8176aa1fd9550ec5bfed
SHA256fe9fc5bf13ad4c04dac45712b9b7e6f354e32ba0e8cb482d59e86cae2fcd3106
SHA5125d550f5cb0bc2761d39bae42f3540ff3840c8b5665d103c69f0be4b088a5e41124438b36301f90a322713f802955d3c27ecdad31ba035a1b88062dc82d0fbb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e21f1959f5ef0d169bdf3be212c9d975
SHA1811e451753cd4cd052b11fe279e9167d6a4c5369
SHA25631cfbcda3486fe9902d63e676a341c5c10bea9591bb88c54536eedb5a73924f3
SHA5125d0dfc51bc00fdb9be4b5847be29859090214372a055d65296112e657b8ab9f2259a6fff790743a03e7e88135bcee2bc869b9bf0574fc6ae69050ec1409ec482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50645b8f48d5059c7b033aa5b27d11ef5
SHA11c09bc7aa818d49427bd9fd5aaf14ec45b3a78e9
SHA2567b3b6c188aa4a884c336cd713132a2989e388db67a295805f35b42e297d7c0e3
SHA512711983e9853143016c8882f9889a62cb907dd6ac7b50a3235606043e54b0cc48446fceea638503d60dce411ef56f2afdb5d5cd9712bcd2eb4b28a820836df1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54925147c988ca5ad8678b918d0d971b0
SHA1fdcb282158ada3c53b01e4454b15136122df8153
SHA2567a7f2de6e23b8ffbbb7097e9936ab591e3371a5e1732c43330fbcf1fb0bfd809
SHA5125bc29fa5978a8974e81134cee37fdc0b81dddd6844bfb1bd8e02bc33dee2bb16c5e40913e09b1b741c43b6714f6fa6f827982b03dfbc328ac2491c4542aa6956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52870b5dcc659793c025c2829e9f698de
SHA1f955d91ee205c316a72e4101fc4460635ad08131
SHA2566dcd3a63fa28edc641c180452286a185f8f1168e68f1abca02fd70418ea2d145
SHA5122d7a4d1127e69a3d69539441c04ab70278142c55b76ca53c387d95a42e3e23c64dbdb3900d86a93a56cfc35676ef56ddb36d80e85918f1161119b64c705de1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630d0defdce2bacace3962f4ab8fe812
SHA17f1cf31eccdf5ca794131017cab3ae5e8fea1ef4
SHA2566010de6a45cd985807722c0452e2bcc6ef62f645e4fdf6a99fe96ec82120e52c
SHA512f3737534df86a5b622c21da40cdccf73cf6aeccad1ad4912d4660e53be43eb00dc580b4567a7075926faa8418ec1d1f60438c759bc4cc8fbc3cc17ac9eef54d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3800682004fef5a44c4070bbfb3f7b
SHA192f7c75451a101290f227a0d4c4d87ab78d2a71f
SHA256525e3fea1e04a56c67bd30c7b345a20ddbc8b032a7fad20b1986b3ce1d2e4ded
SHA5127d7575f3fe37240f331c369ad2fff1aee03037a63a8588e0f27a1429198f4c87cdc684d0ba3d46faa8230000d487a3abb4a17aa133f1df9ee19c5d205dc0ff20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef27774e707dbbeef8cc50ad40f9e94
SHA14a4bd53820ac4205df8364a07792c3b510958913
SHA25637da10ee49fe1e6b1b4c3e1e0115c742ec74461ae29f7ff3486cddd50e1baf96
SHA512ebb4f9784257af3e898eff7033580c654b9725840da557695bbf465e357847ddc8a7e4ae09f2d2789973f7d147468e5186a6784367b62967a7214f321f5c94a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b732b251081e35590ac158fa42609c
SHA1ccff1655dc35124060daa173a6795e098e85a21f
SHA2566a97eccb94024ade15d2b5fe37d3949c68dca1dc4353d7733d87f9af56b584aa
SHA512aab036afdb452f46d6e8c0d620caf2aca6013982345a1312e342a04dd9c19c144afc4cf9ed51ff78bf76b3d9148019192362a983d166054adbbb5c2e268108d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521aa7ac2875e63bc903ff51e876befd7
SHA181f7b6605aa9e564c95a084ef0642f2f16027014
SHA2567a4565abffa9aa507a1dead3c5de8f80b099b1dd3b565857331eb762fd47fdcd
SHA5122c281b86b4584b33fc1f1b0bc769913ad39b18760f66b25d5c586ba015a27d3f2f498e63acd4364a55c687726187db927f202657229f7182c5c83ccfb007191d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52278215e59f9a442c04a782b7f77b81e
SHA14fa573649bdf775e164e6fd584379e02c64478b1
SHA256f7d933786d84a8df6da0fe826472f501bf0475779e701168d368ad44a25cfb09
SHA51255ddccae2a96427cd32d47a955393b136b194c6161e624c60ef8266ff27b39f1f47fe7daf470e4973b4e5798ed928623c9c32230a233097b5411ad9fdbc5bfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD579390c9023b07e127696eb97dc80b08a
SHA1ff618c36b7a469e2d726e8dec3687cf826f82d81
SHA256bbeea4d44af1764709d6f6ee8220d23fe412da392eae89e5a68fd21db7d4e700
SHA5123f2939047fcf0e506fa920e3994d8d861bcf74ac1f80d67cdaa2540324835dc68aa5c06eea0462984c6394fa75af77dc0d117739c23eaa35d5f19385bc159695
-
Filesize
61B
MD59962bcb8303458e16efd373974556ec0
SHA1262db44cababb80170e7693e1845ea80c3250c3a
SHA256cc13a6887b97674812ab65193eb0729d7b498a979d432856ecceb07f49f724af
SHA512dcb575f87641f3c6388107e6cbbf4704945cb19c212062bf1afa7aed9f9258a9201c5bbdd427be4990ea1c16273a5b58b464fffe1cb008d630fae0dcc9b1bd0f
-
Filesize
22KB
MD5672c4e166980a4849e15438b868ebaf9
SHA1b813b564f4b48bfe08d8eb5ddceedf2de0a19385
SHA256d01fa73febb935bb264839041e824b01b4bd833c2e867c08ac0fcf488688dedb
SHA512e4dbbd91ec921272b5d7192e4aa5d0f7c6aa39d4f650cae279db51b617c987244a29321700f61c86b408c94c42cb018c467d3047d7b04b7966fd79a1c35fec52
-
Filesize
877B
MD508c6a99e5e2ef98edc49fcd573077044
SHA17e5cc39a4451b98adeaf19a27daa8d3cfcd37905
SHA256bc09dc9c3976e72eaa74e16bcf8e6e56b358679a47d1f3d0a9fc8f024ddd0150
SHA5124b57f275e51932c8489507a186df171c35e75ef92f54a3ebd2b6b261f5df4004ba54ba0b3ba83461a249d8a0169a0b6144ad35e57aa2e2c71edb3dbfc0c5a3e4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\qsml[1].xml
Filesize209B
MD544861740d57a6e862991cc80ab457aee
SHA1fca726539986bb14367185f6e5f1198d214d134c
SHA256774cac33291486799ba3e66e1912c8f4e47876384b47f09f01223b626ad692c0
SHA5122aa3e226804cfda553132a4f6d325dac8a56fd51e48887342a9afe2354cc317992a232eede269233957d137b4c550e93a1494c387639fd4a8d8b8cc251fbf392
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\cropped-favicon-7-32x32[1].webp
Filesize312B
MD54f10326397e568933feef7f24576e7ea
SHA18b6442a1ad3a6e1f84e911d04b234a6eb5a4af10
SHA256478ad3baf4781b59204bfff7d6154891bd4bc930e4ac1c5a2703196336f04992
SHA5125874b1de6f249e9a51728cb858d3f0c33e06bc887386b870e598b7d860622c1bac44b5be98ee51c37302f9c5b56b401e889bfac353983dfa06e9dc441f21f771
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
58B
MD5f8e2f71e123c5a848f2a83d2a7aef11e
SHA15e7a9a2937fa4f06fdf3e33d7def7de431c159b4
SHA25679dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121
SHA5128d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e
-
Filesize
112B
MD5d8e56231e5f6d8b5bd2202cff8d357f1
SHA1d0ef9eebcf4d95970683c130d5f47bdb0510764b
SHA256e5e1f4dcf518b396e788d42868dbf9ab75eb3e087c9d660b575b12bdadea7853
SHA51271b9a3b127ed8bb3a0b4a8e7fab2713816199ed14b9152519c11ae37f77ef899742a40f9003ee3b5000c7e47cfb9c6fb2e23dadffed560d2212162977b199407
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
5.5MB
MD5fcc38158c5d62a39e1ba79a29d532240
SHA1eca2d1e91c634bc8a4381239eb05f30803636c24
SHA256e51a5292a06674cdbbcea240084b65186aa1dd2bc3316f61ff433d9d9f542a74
SHA5120d224474a9358863e4bb8dacc48b219376d9cc89cea13f8d0c6f7b093dd420ceb185eb4d649e5bd5246758419d0531922b4f351df8ad580b3baa0fab88d89ec7
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
156B
MD5c1edc8173c8b3b1293ea622b541b0cc2
SHA112ccbfd449fbbdf881fe05a57fc6e150dd4ea00d
SHA256f03244fa9a9c6b1768bd604579b5e13672bbff2762d9639bcef5ddcff2e63ebf
SHA5128435897bd508d46769d6b25a3bd9f22daffbae3866551ab787ac834fb6519732247a5bd2e3ba7d042ef18b24b2f83e2020122a3543d8dea3e6906f0cfc65e6a3
-
Filesize
15KB
MD55b3edb39fe9c026322caf37ea10f6733
SHA13caf8b5b38feb87bfeb0e01e59d4e36f110c9e9e
SHA256a96b1c95f51b088ed5ec476485a6aa562cbe68a88d0261ce88bcb3dca1f1c8b0
SHA5127930e12c72744c9cf5e2f9b93236526289ed3f9773b92c865228ad33ab45d64e73ee5604a74e49630e066d802a5ca4602d4b986131d267ce17a8ce5d3b5f054c
-
Filesize
7KB
MD57583254ceddf4c35b2ba3acaabecce8b
SHA1edaca4bdf6a3793e2390d56d73b3ddf53672e2ee
SHA2569d4dcb111b52289f3b005a6ae02de2b2ef66bbe0b761d009a59bf470e95ed7ae
SHA5124beca247af53a0c59c7f76cdc6c4ac709f2c06f115e21cd0eb69f90aa274de16275b659a7d64aef7d5942b50566f658cb7f130a1b42088e23075040865dbbda4
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
1KB
MD5118a0528dff5b2df41fdab3acd8f26fc
SHA1db2f540c59b9f7b1df41d58734355fdc1213e052
SHA2567bfc1ce706ffbd44367b58d6450f4c6443bf4d4e7de09b63c43d6b1a752f6923
SHA5126160c009f4e3a7bef98f506e00b677f7825ca31c6bf2a45e4ed5743becae52156511ef7a209114421dcc9f985c9ae6aedf8c73da5599fe781fc04f8eea7a3aef
-
Filesize
1KB
MD5694ca9861a096284d37517c787df5f8f
SHA127f599e37cd769ccef793f0266138b035f3fc301
SHA256418da101268a7d88b6f9d0ee739c7fdba907d6e9bf5bef271619d878fe6c2641
SHA5121124d77af5589ee33610bce6abcdec52bce74641ca6057d54c17784a7c79987d85ab985ae1f39eb146fd3a08c2d10fa9041b797f2edae7d880fc1146bdc7d39a
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
120KB
MD5c098029d4cd7b60fb9ec45594b03d022
SHA1f8d3e8fa5003b610283daebc77ddf43adba7e9be
SHA2568b48658998701bd8589c4bd72343eb8361e9daf8038dea775722bbef8e85b632
SHA512780130d6bc7aaf1684d31db2b5da30a11d510e5363466f4f1318dc90bedcbacf2ae88edaab52d30adc5c857fa22cfd755d2a8dace34ce3a6744ebabe2c605d19
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
136KB
MD5b39091b1ae870525b7c26e4c8b4658af
SHA10929bff19771c253ea7f8f3f7d6f1e98804e2845
SHA2567d69f3934be22a9bdcf0e20059d6c0a851218abe9aa07b83795c54e696be6142
SHA512bb7d5f8afd389e019023e95e8f25b9a76cb0fcaafa4714af9d63a05d58c0d6aefb859b883fefb5540e0ee878525d67df4ba5f6ea70d968e6e09058182f49aba5
-
Filesize
16KB
MD519c21b6f1a75b288fa3473bf61001431
SHA167d287f896e13b1748c18e91e0e589479fca1a83
SHA256aef21f81751d1e567c81fa1059e7de79feb694be3b0849a5fa6fb03bcf9c7eea
SHA5122f371a04b916cf7dad0e8719b4a6fdbb31469adbda46ccdfbca0dbfa290d2d5fe4dc49bd6bd56a0cb07232f77b549c6b3b8b4140463f84bcc54c721e23f4cfed
-
Filesize
1KB
MD51715cb8a5622c329092cff53922c6d5f
SHA1c846504af9264dc80c45ddab30da28476ba7e2dd
SHA256494b583cb761d1d325c922c0b58538f2378de2b655d207279fd69f75dd7527ff
SHA512aaf3e113478370856fb727782a053d28ef8198751368bd7fc7be8f44fe7d85246abe0c1984b153b07526819ed8cf7a42f3589516a366204d37a2c4e569a3d1a5
-
Filesize
19KB
MD53ffa42c2881aa7914781072cb2854008
SHA1a350155c99e6db799b7cfdad393c3c06df0ff779
SHA256cc66f1c5c8edb8d6af3ecd60062a05ad4d57bf0b69a8fa05fc675be7dd0bba68
SHA51223f519f7e46e43eba7e0cda9609808a60dc3a14842f01d3a155cf442b4768759ce143f37fb93c38430cce103ebd3fea9d1196cb977eb9d7f9dce4c816ead4f66
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD5104a7db464d2052a4f1a6ddc6b101078
SHA179e5484375a29376ace7bd82fd83dddd9cc73c9c
SHA256c171ad2b608e577ac35e23b2d183f3278df788c668c6cbe8405893418c43dcd9
SHA5123d6c469b3e29d96fecaed4bbd45004011b7a818334695fbefd17e244fead954780519aec79e3c6ce8d035af9e5d8e9a351ef45be4dd7d90732ba3a5c472ad918
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms~RFf7a7465.TMP
Filesize3KB
MD5457d9dbe894ec18fbd6063b3b9996e63
SHA152b88f4a5f37982a7e593019651b2a731e429d58
SHA256586110543b770d1eea5e0f0a6b2f66dc83163528b507c9ca5d6b7e48f1e211d1
SHA51219837337ae2e445c4e7949277b5c3182b233066e0ca5ee63872909b3b1966e92d3ce150334c4dff88263506998e303f81f1fc55ec36bfeaef25003b8c12c4377
-
Filesize
45B
MD55fd0fe749a4700ceb6de93e9d665a1e5
SHA148f14358ade684d98fea650d601b2a04e81c15e3
SHA256e1085a0b03f6f33e48358260abdbdcd08c04263cc2fd7483bac7f6fd65a78c3c
SHA512cdfb2fa391b87a8c38f27045ced9da75a103eb8dd48a87bd9d3aebd58f7c98b2fa3cca2d79be54cf6ddd534c8603f0728f88a1a6856609d9c03ccc903cbc1c05
-
Filesize
174B
MD57184e1f5e89d461634714ab24eb6142c
SHA1ff02efab09c617c919ca940a3f776c764168cc74
SHA256797776dbb5b9c6fb914fe749961ab973650f2c3786922c97eadee22c2798ff15
SHA5129c2950d45f6298cc5a25409d8962e3ba2bc713b12d1d6587ba4a3ddd8dcc4cbf41ba58beaa3028276b75a251abf0d420f4b93edb8ea16404230252e739d19fbd
-
Filesize
261B
MD5278937682003826f12ca94a1072ccb46
SHA16263224adf78bafcf7d50326e602b34eb550e7e6
SHA2561b4d2a7e3b8d1a438aa5a8a9a0f191d47fe04909c5041baffaae6a399acad16e
SHA512e2b28e73f3a43c516098f6fec4f214551fe86e16c40b9c488f0f8d18d1f837cbab2f46b15be277f4167176e3da62ad54bbced678e308ec8e3203bc9f88ec607e
-
Filesize
303B
MD5d5efe454b0eece7e19788787c2302b0b
SHA11b7768118f42ab0b73456e3451fc912d983e2f62
SHA256119fff986b3768d52dfb77f101e16c7c575235eb6b7801b84a33154a6100e9b9
SHA51293cdef30ec8171c78d8e2e5f434e8f775f2fcfa79b07f27da91bd6241851a5c809130c5c93fdff67969561757526c7cf85f2455a8eba384533b5f80e120a9fe8
-
Filesize
272KB
MD5d47efb4b8e4197176cf4b68ba7286619
SHA126283660ca87b45a9eabd935f16ff465c49f1e37
SHA25667171b709fbfbf9280e0dcb30105b8b6512ae9da45cbab131753abc28765ea02
SHA5129796287e5c1705a8d2d0ec4f99ee4698a853a329d9a9e90894a2fba6503c6d4b506ca817e6c9cca1ea49b32157fde584e6a14a44c7eb755e5e8191cc028528a5
-
Filesize
292KB
MD5bbd8ce48ae61b60faec329d2ac1eebdc
SHA14ff2bef58eeccd8b401e3131259542ccc278944e
SHA2565a3a26fa07039c50c1c4fcf23067ea57ccd9648d75c7396d067c5ea86a05e637
SHA51236e3bf9dadeae0953c259dc52361620054d9bae80cfdbaf0005e287521abb9d170eba7b244d774628d085de22aaab5773a97abadbcd687460a0064f225fbe855
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.MSIL.Crypren.gen-d10641bf82beae9ab02073e8e1c8b293bac836fb37b81b07e4725da010bebbb8.exe
Filesize103KB
MD5f08fd90ebbc0ef6815ce31b99e29ef65
SHA1a99144850077c2331c53cb61b70ffbcb9a0455e0
SHA256d10641bf82beae9ab02073e8e1c8b293bac836fb37b81b07e4725da010bebbb8
SHA512de87653d83747283dec12f42008e93dc66e979b4e94a0951868e188741b3a3f17a6fe053bf8e4c65923480d853caf4b675c3d571cb47fb3593a30abefeb33c1f
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96.exe
Filesize277KB
MD50356218996dc4ce89ef659cc7b337c89
SHA1a1343a45709899131ed7582236b408b84df6f8e9
SHA256085198d732095e24f5165d61636930cb1012b833278d86565a66d23dd0ffce96
SHA5121dc5a20e88c49ae67a34cd2f603a0e67a2a7a001c478ac3589cbc6436765b506bd2535d9aa9f11e237f888d0a57a8d0c78f8e3586468116d268d4ef12775652d
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0.exe
Filesize424KB
MD5e53a29e6ab0fd4280758e44217b6ef53
SHA113a70f22c5d32f026c0bd2879f77cbbb6e5d9b16
SHA256b5abdf8ed6c6c977d3a28d6e2763d71117c9135a9bb07a61b2f17dcc6f1ceff0
SHA512b5c562d7b75fdb0ac86103a86c74bc133dddb2ce83c890307e110a6c5af9e9d98ea8b4d7fdc6b206d5184d1ee3f6f42f053b83205b8ff0e1692ef7690476eb5d
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Agent.gen-ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432.exe
Filesize266KB
MD588ac97d8e2627f9848be4b9bac6473b6
SHA19eb8d887614bb0c00bbd0bcd70c2b2a77e67857b
SHA256ea76af7afb2f8219cbc1c470dafa757334a5df04eec25740b88968abe1365432
SHA5129088d54f18578492c878b4045735262619e3f117604aedf71bd20845b9a30e62cc83a69966166eefe08a4fcea7f6de95ae4be94f023cba4b6f1bb795d448fc4f
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Generic-aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8.exe
Filesize1011KB
MD5ecacf1f0c1009b9cc9c8bde6db0b2fbe
SHA1c09caef47ce7f78df38ef423731c2207458c5a42
SHA256aa77d1c84fd78533d137c5642da8331b0021fe366519cfdb13117b11a433c8d8
SHA512345966423e495fe692498ab59325ab564c2897c5fd166a52b39c0c9334b08bfe01033feda4491aa2fda4bc54bce33685246a4fc6f79643f0a06ef0f0905ec419
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Shade.gen-a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a.exe
Filesize898KB
MD5dcfa8eef7cc53a9b62370fbc64439b2b
SHA1f326bb6228820ed30e43cad83d6f794435c92f72
SHA256a0e7283263c1e89537b54a14e065a331749285f8b7fe60488d360bf7c796aa0a
SHA51214a68eab5989f183906c38e7a114ece1572ab1543ece1bb8f636598dbae19a7e2d8189bdeebf705672e1e4c6fd8419677c08787c2662bbbd4c6810fec7e0a9d1
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Zerber.gen-a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99.exe
Filesize226KB
MD5f4a572691d518df75a0b3036478b5767
SHA1257f55c02ef7e0c37e76db65865e3d5a3fd98a74
SHA256a0e0728d5a6e11259b0c4f167110765d06619b0a1fd6af91c8dcd64825301d99
SHA512d5860d8823a4049999b8317bc076b9bc61d2c0793a5917f427c8cf083f07bc7336ac1fb00fef38e96e8d9687e64d7c4cf4e68bfb9368119030dce363c167c511
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Zerber.pef-0eff1fb1a0c9d0dc59cf909f1f931756e57e9af39a844340b247c69fc971b614.exe
Filesize276KB
MD5b362c947cb19a7495254e4f6fd136f32
SHA1f73c4b6f7fa96a89a24370c29cf72a7ac96acc28
SHA2560eff1fb1a0c9d0dc59cf909f1f931756e57e9af39a844340b247c69fc971b614
SHA5122b37791b041a59d299e5fcd44e14f6bcf98d8069be2e1dcbfd6db98f7d3e3f7f156f7ba08f11b8174d3147cc13492dcb6895f406f8a2a7531c75b435551e0be3
-
C:\Users\Admin\Desktop\00291\HEUR-Trojan-Ransom.Win32.Zerber.vho-a977765a568fbabd5b00635cb7d58863154c32b50dce5a78e23428a5f721932a.exe
Filesize235KB
MD55fd23d423b98de380606ea5233e76dc7
SHA13012a1b34a8a8c9d855327a475d1661b42a9f69d
SHA256a977765a568fbabd5b00635cb7d58863154c32b50dce5a78e23428a5f721932a
SHA512774978a3725eeff1896ecbc324ca4bf8ad3ef5df9dced65d6ba6bc809ee2f42ea8876b23f3fc7fadc0e3881e430d2e8c392806d121246b15301b7683359dd101
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.NSIS.Xamyh.bht-f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9.exe
Filesize146KB
MD5ed4dcd144acfeb1ad5e060aa1012ad5a
SHA131ab65dad19b3e95ecf1e8f668090c3794f7daf0
SHA256f5c1cf1fe163407041a3225b9eda09d1ef44faf3d35a4f87a7bf6c7a86a74ba9
SHA5129eb5483bbeaa2103598e53b6140259e9682fef7ed125c8b4141b5057afb6c1067aedf77e08fe33df2c8eb90140446891869ceb79589d17e462070eafa4e18979
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.NSIS.Zerber.fp-21211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726.exe
Filesize240KB
MD5ef84b1eab0a61dedcb7a449a2d457a74
SHA1584c0782c67807612ae70a6ba77d550bb590d67c
SHA25621211882310a506c89dd373e6aa8e6ac0802cefb7116879c0737fc1de7ed2726
SHA5120128a9c337b7100175bcb6103a9dd7dba80721445d3d603099d24083a8f62287ddac5203254027e304fdd388dace552adcdc4c95a601d0820a5e23db3927d648
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Agent.iyo-4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79.exe
Filesize20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.ixe-8c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f.exe
Filesize608KB
MD5952422d06b3b8679bb6c2f6db73ab168
SHA185fd689486ee302bac24e747df59eb0ad23eccb9
SHA2568c04de81a783137b2d326d6b7ab68b758c1ecccd9a6ca8e524b1de7f40566e5f
SHA51261860cd37bcf5299ddd95c9cd1c6f0693263832d3d7a73add55c5db66623bb1d8385bb649fa1ff387059f462654a0533d8502c37a3661b849c7d4eb88d7cc013
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.lff-69db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f.exe
Filesize369KB
MD5d6e67ba2bc08d23512fc12133769aa43
SHA1bf5caaacc484d3c951c0d918330068bba3640a0c
SHA25669db3826b8c5a29da243c6346d3cb29a2dd6773061bad375858ed8be9921c75f
SHA5121e7bdc11e182e9653a844bde9eb8d82c816ca0a8e974c5acf73d5a008f95a3b8da9740b5d4888466bb68fef65b107e936823842d0875119521a817706b0730d0
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.mso-a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab.exe
Filesize388KB
MD540612d96d1e7ca361a36f879301d548c
SHA11877b850c46c03a3230c4dc3b60bfa2e9ee46565
SHA256a696330849345378e216dfd3588981c5113dc8478301f4de6a0aecc6c12f64ab
SHA512f026e3ec1520f7b37a6a2a0a55690618278195c6e81145e0dab9539f3ab27367ad2b98e4ccc7cf11b92a793b59f2cbb6c234e779f93901d941202e3c18fba118
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Bitman.ovx-b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f.exe
Filesize496KB
MD5187310e9d43a5b07d19311a0328a46a3
SHA112fa92a9096581081857d7f9d5f44714409466ea
SHA256b21630178f1dd4177e63e9a1225f85531fcbedff032f792fddfeee5004339d6f
SHA512f7cc1d4992ed761716372c446503d15fccb5f20b6b2da917d43211acd7f52dc84b08a6b44781395e096cea24ecf4c5a055cc23af10eb10b0521af0e9e071a29f
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Blocker.kaud-2f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555.exe
Filesize200KB
MD55fe6a3bd5194be17484ded6dad2a9bad
SHA14c71a0136d021f2f2faa0ec80655bac4c6357af9
SHA2562f194938918b5bd0737898b876add7101507eb346dfeffbd5d63c9279f285555
SHA51267039b618ac2553bb3299f305b91ad34cc7cc912286a309c201c4920123625cd13913678fe42c6f946b0ae369a4f8a69e889774ba78ab272affba69deab8600d
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Crusis.vd-9a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a.exe
Filesize314KB
MD5f93ecc98e4c4659023b81397578201e3
SHA18c6ce5195b39239d219da8de3b4e757204f75f07
SHA2569a5a08d7a4579e11f59594fe053c8157c20ab74a7775a11a1aa6154a3eb6744a
SHA5126835d190e85fa196e325d5b9e9833f88b22348b5e7dad7fe10aa2b065c66e61342cbf31fb8a4c1b5761a9f72b2f55d7eaeab9f8ee411ade6090327268a85a039
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.CryptXXX.asdgco-3c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198.exe
Filesize6.1MB
MD5a7fd9237c2c3f2047ba9a1614fefc049
SHA1b560fe4756954b602a93b83b5d675153d1e9fd30
SHA2563c8ac670d8c920170dd431a5a08cbefd62a98e369eb552acbc04a0eeb2f2a198
SHA51290818b6cfcb238def0b05d95e42d93c26352c9dbbd5235f0c29e989da3d4e561b021e3ab14a832cf38793be11827b3030d82e3f15bf665ce07b4705250951377
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.flts-e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653.exe
Filesize86KB
MD5220b2202a7016cb1f0ae6a66167a14b8
SHA127964201576755444b0285ce5f42bbdc5c3b31f1
SHA256e15f77021c20cdb4f5d358941acaaaf80973fae74038b34980464a44b0b86653
SHA512c8f04d1112bbacfd27749a1ea177440b9a693233c87bc05f50c0300c405e9fefd618c4579d7466e12f1b92a2b0384a6bf8e574e23535ba3fa1e1dc47623538d0
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.gthl-7524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5.exe
Filesize64KB
MD57f4426e3a700c19838f4e79cad10ce22
SHA1699d3e7b28f3091b13b41d9526da0a0cd9fc72a6
SHA2567524b52fa8d2c71d090506aa1f0d37636793749499fd7e3e567aa69dba0274e5
SHA512ee23ea984c5bd3f8672f294a9f8abdd1342b845c815a8d20bf61b888ea987044130b26f091b075ce8082899d3e150365939b9f087f3bd2fd804edac5aaf1172e
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.ltge-5696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3.exe
Filesize287KB
MD51dfea60afb5e10fed0d911f8387234fe
SHA1201cb6f4f0e19cf722cf70651e122a5a46e6d409
SHA2565696c2ba65833ee91b844858b0c9d43d2fd997d5131d2c4ce549e7aab842eaa3
SHA5120ac5448feda2641028699a1115e4a441407d9f8ab57eef630af5fd89acdd123d6fd8e45c7701ba296d7a2a95acfdfe66560cf735fb674dc3d44e620d8bab3ee2
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Foreign.nisu-e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557.exe
Filesize385KB
MD5878b1d7b44f77f4d725a29a0ba72bcc2
SHA192c5592cf5e7a20f8fe1da5d535bd6b63657223b
SHA256e90de45553e1c7cc29fcd8368abefbd3133d469df34d4cf82ea119a5cf932557
SHA512cfbb996901b6c976db333399c2daa491b684d79b98dc5627903bf8d2e577d39f9feee90c0e2fed6a058515fcde7a940f415897f3c1ba11c62a0deacb1e1be285
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.bil-ada2164654315680132754a7063d2b94428d9101f302ff2a90dba6ab8ebd82b9.exe
Filesize244KB
MD53ab88a42acfb6dc48c8b10641f60ba6f
SHA188f7cb0eeec56d416503fa6e957f7b5e3d2007d6
SHA256ada2164654315680132754a7063d2b94428d9101f302ff2a90dba6ab8ebd82b9
SHA51272677cd7a2da38b81aadb81f5e8825d212214ce9b31e69640dc99c7f6e87a32c098d8038968eea8cd83bcd74947971044293e8baf7151fbbefe0e457e66f27d6
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.ex-891c9e5f09c94e1dd4ca1eed54c828a9c0f84c9ccfdede6856fa507d684a1293.exe
Filesize206KB
MD59de151d6bb9c61206048d168476e7baa
SHA11f57ccefbcd86c0209b7e2dc8e9aba8eace78de3
SHA256891c9e5f09c94e1dd4ca1eed54c828a9c0f84c9ccfdede6856fa507d684a1293
SHA512d7965539a6ddcac3dd5fb57f2fcb13fd9c19da33150953dca10c526ba93f0da96382fbf2f4ab4acb6216d4716c07d1ee9289d0ed6fe9da4624e7445597093cd2
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.xer-f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b.exe
Filesize392KB
MD5e062161209de5934a7d5b95876ccfb9a
SHA18c5b9f4c66139fb8c35f2ef21b0e141daca3c26f
SHA256f38904e8444cea55342760c688a40f78478bfee89462a6a0675c01870388956b
SHA51259c6fdb5a83c05b1354e9cc5a946eaa5e57cf092e31779b285be5e536295e4cb35c1d65fcb46790b3a4f4f9e251a6e65b6eb6045d4ec493193e3ad0c3c207570
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Locky.xov-85f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6.exe
Filesize397KB
MD5a1cb3b6421e2c57341ff0d9532984fa7
SHA1d72f5a681398da65e368a2eb3f484a0e461607e9
SHA25685f2b584251421b7ff98b80739bbacb1ace3fd48b2f1e039733de9c06fd733b6
SHA512f64ee498970b3837fabd61a9355447506468876ec338df54dca2ab49d9668d57e68dd4697afeaf401a445e00443d6983d4811c13c867425807196a579b810a69
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purga.p-bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1.exe
Filesize268KB
MD5cb0899b1c30068c16b41791115ffff21
SHA1fea94ceb18f67c3715b0cd60f2a994054cd859cc
SHA256bdb4d7bc6e0d28bf50a77d01489b44c67ad858874b456add8bd8caf1db53f9c1
SHA51245f7def6b06d98e7f2dfdd5a7dcd605d2a3035faf978d7803a6f10192693b7e74cff1166e4cd52a997a66246e3eb1a4d2a92fa7257f17c179c84665ba8e5c282
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purgen.cz-5a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168.exe
Filesize238KB
MD5c6e35f903caa92e8573dffb675e9e8f9
SHA16e9fd5930d0a7870c6d73bde017327cdfb3cb6ca
SHA2565a721cdb14a1be01e656299875238666aec2d7c74d4012a6170b67d130e55168
SHA5123d5d07c78d4b6aa6664929de79e7d24139266a8b2dbe1621f52dd5dbf9cb393655b5bad11e95016b379569c0c4f64351780e8280c0c3efd7e82e2fae33c717c5
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Purgen.dj-2815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234.exe
Filesize232KB
MD51bbd2dc9746292c60121865663b287f2
SHA104644335ef7523274146a4f39ab30621c2a2a9a1
SHA2562815c8cdb02003298f7959fd1cf6eed893de6652f3861a6a2e3e5744b8ac9234
SHA512da557f37abac2300ee03e4167d1dbf9d06d7f6faa6af887fb0966de4c3c7d35117f8ca0cee6e5d68d9ba091ab9464eb1a4b601a759c3b860b141afc346a0da66
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.SageCrypt.e-372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3.exe
Filesize380KB
MD5c7e481d591a25733396f9f70a366551a
SHA12002ca64b62c371c7bc51ba3b0ed9fae50a3bcf4
SHA256372df334d3c39186e880668677d75a5eaf714c94803ec4f7997a3e55789c3cf3
SHA512ce0cf24b41930f7f0e98cffec804cda6b85bb7ba3fe3c0d31e7894c352fe603f7e94ef655037aafb5d323a298bad537eab126032432b2966c65de90ab9c1ac98
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.nbv-69ba6ee95db4f02439a183c4d3f9dae71b9b0a4071c82076486573b446b38922.exe
Filesize1.0MB
MD5ab16895306479daff040e6be5d03a92c
SHA104cae7349ef45493199873113e3fc0e9afdac69d
SHA25669ba6ee95db4f02439a183c4d3f9dae71b9b0a4071c82076486573b446b38922
SHA512bcd5bb18b768c2126e24719b2fe131e6a85fe040fc67e3b696eb0bf272857b048b5bd10a8954ca11eb8f9e084695e32b8ddd39bfda1845a64230543339d0049a
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.ncm-0be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a.exe
Filesize1.1MB
MD5b041cbcc7008f5e6a7e0a6fd21bddc6b
SHA17c466aff7835818c0752bc3b88b9a32565ab2b4e
SHA2560be9527b45f515ced879988770846c828e3be604ccaa14b6a9ce6e7f2fc72c0a
SHA5122d8ece16726410e336fa06244d7a6f400d0db6d90b59cdd7a1f6f03ff9abb6ba3a1e3cd2e29aab3a2a04b2cc18a5a452a1f1796c79c71ea59534579aea25b397
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.ndg-a6471b8ea3b85c148a224157126c0ea3db8e803af5f93daa7deb4d63afc38d90.exe
Filesize1.0MB
MD5f6402c5dccd957c6231e4902df7c2865
SHA18dd6205623e695bb4ab7f02ca5d31249becde7d9
SHA256a6471b8ea3b85c148a224157126c0ea3db8e803af5f93daa7deb4d63afc38d90
SHA5129b90926308552c8cad4f5545a994910651eca44e8296869bcf1d9f746b010447f124be4d3b6e395241f6e5895cb2d1ab885e6246a59acd96dbcf3508a1b24b8b
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.ndl-bcdbaf591fdaea9cf391c369b626a2d73a458759686db76e9b3ce857458eefb4.exe
Filesize1.1MB
MD5cfa0877262deeafc5277e2e87b0c2036
SHA14d6a4f1058b03f6c022bbad5b9341d46aa641d39
SHA256bcdbaf591fdaea9cf391c369b626a2d73a458759686db76e9b3ce857458eefb4
SHA5129648bbb7101ffff53eb0aea8a9817567055a85b1d7d5e4b8c0888bb572d058192833c0821538c17ce962437aa35d69ca2afa67551834c838f8102d8e977b37a9
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Shade.nep-ae1f435b9f0a0bbfc9cd2659520ba98b6a29d5961d142e4b36ba537583596b36.exe
Filesize1.0MB
MD50222daed1432d4f7529f49b33125eaf9
SHA1667ee62bef5e7f82f705f944f792b950198ebf97
SHA256ae1f435b9f0a0bbfc9cd2659520ba98b6a29d5961d142e4b36ba537583596b36
SHA512c1f5f3f7ede4de69a9b02c0974f3fd03dcab568e9c01ff967a9645255411cc565c91f938c2018569df51a426bf4312d47e88bba746c45e9239145c7f88b08301
-
C:\Users\Admin\Desktop\00291\Trojan-Ransom.Win32.Wanna.c-b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.exe
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
3KB
MD59dfc75037c8deccc2f1840b249b17750
SHA1ee37e409cfe2b124e63f98f1797aec0330204b82
SHA256b5680fd682b7f64e577492c097c825e4a5a00baa82a8668f478640c5f8918da1
SHA51225e9f3546af040f3cf782b4d6c511517ac0c95cfff8b3afec407c5917427f3129c92495f95873fb67ad928a9c7ef234508ecc9ffd8835da260d8fd1e64ead16e
-
Filesize
9KB
MD563059c2437df277d90a7ac6404e5d686
SHA19b97c5782849234b50eaa612eddcc42279f30895
SHA256ed60dc3ec6d20ed08a692f975379eb2bf3631ed13e419d9e374b1f5cc3152ec8
SHA51247e36c09686f586967f3b89efd1482820b9993893478c08324e7752ab00dec6e9889b97b7818ebe3daaea894566f173a72e798ece709c60d77e1ede1bd7d4a73
-
Filesize
9KB
MD570286ad1d2fb99cc886ba25a291106d4
SHA15a3d8a08ef86248660f2f1fbd589236c6264cc23
SHA256dbd08283a2a10812b0189076e0c0b534cbd7c58716e599233612bc99c1262a3f
SHA512896d3fd58a7144fdc3ab11e45f0394a094722e418657df32ae2e69eccb7d30209fd03b7c6f874ac830241b596bee2dc9cad40f6d7268b9c648792e448a24f603
-
Filesize
150KB
MD5953a4edbf54cd135ab869ff86f055be5
SHA18656d0eb4a2a6b562f33abb48ad6ec49fceb5896
SHA2568e19c81c2a8fea004a0aea2cad0bbf45990c17592de55a695f5da1f364fff000
SHA51259b75701a9938729aa4cf535586c96dd93f9564ca797ac00961f4275daafedfa6bef2e325823edd540ac4adc475808607894bfdd517a6a3cf024f957c8ddcdc6
-
Filesize
75KB
MD5bd76837517b22107cda6e09d6092cddb
SHA1816a1f4a27d557c907c9ab88d7318ff832f03244
SHA256789a4f38fe0e257b0565b36aea784e3e531347243e0e2c61d7b2ad25feb9dfa0
SHA5128b1c6ccf99588763b65cffbe14c4e242990fe7c567122e2f18add883282d981003c417600283bf09d0ae28488d10c6c49ac9b41febc934f3a68d307b052ef029
-
Filesize
1KB
MD5027279bf8835400b0a34df3e089b26f0
SHA1512685863e0cd5f899306c5d550f6e1323c7ece1
SHA2561fc7ea91c44367118b8a5684954ab8e36502f182bd945aab3801a4346f8a5495
SHA512d3bb833413091268ca8e59319b4ab117a26b7b38bd2d35db3c33cc535cc326a09184ee5d52e2d631727f606d49a8570ee973b8f74723d30699c43ee8ad5c7236
-
Filesize
12KB
MD596cf880ca0a42dc45313bbb8b277116c
SHA138b78bb134ef990f078066d197873e75109d8902
SHA256dbffcf046097f08c85af29cb16ac10aa36301899782b6b5c44153630fb45f0db
SHA51249aa8affbc80103eac6ac09dd5ba762900510bee063b2d4dd2ce24d1198788261248cc70ae1b101a77f89ca153ed69506545ab9781bcf2a22c604b2efc6aabcc
-
Filesize
10KB
MD5a2c1c7f001175774771e5f380fce676b
SHA102d693247805f4db900dad6a6a9cdbc466d8a42d
SHA2567a816f1fad04c39a0b772dda93c02ad023248e7a83c3949f8872ef6e973b5cd6
SHA5127f8639141afe81dd31f2031ea869619c4b0465afa4d66cecf5486accc78e0be2997efbdc2bfe9d1191174bee32dc23226f15898951e1afe8b51f1481cb09719b
-
Filesize
85B
MD5a7898ec9fb78556dab44fa6a3d968e7f
SHA11733cb7f2408ed08e8862923e01bbe2232bec5a0
SHA256185ce2441e548690cf5438b586eb7681f5292a5b4b4af3de0c34b152242c7f2e
SHA5121a83a7a56a6e405aca2dae5f84065d57e9302a97148fc428483e850bc1ef7e18bcc024ab8e35555572211c75a309d3210e0eb2e77c415133ae35092fe1cffa95
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
Filesize
4KB
MD518c96dab7ce8eaa67ea4830c940bb20e
SHA1485c81fc6b2c1f16de0f64f1ecb6a59e0257dcd0
SHA2562b6f0f7c8077d8a5005ee4e69c9d143bc07b4a070079224a0f5a37d992331c32
SHA51265b2b1a1ec219253a38dac3e07ac6755dbe20d92608ce0b7958c29f94157f7aeb7e506cb95b4cc541a655075c5f4a11c365fb5b3792e53bcbaaf9419c9655aeb
-
C:\Windows\Installer\$PatchCache$\Managed\00004109A10090400000000000F01FEC\14.0.4763\PROTTPLN.PPT_1033
Filesize12KB
MD5869f9133110546c95f112b850a33f98a
SHA13c8000224b3dee17f86b893ab7b60ef21fbbc14d
SHA2568e3385e40b72d42de5564395b005c12680d0722d82c1b35c9213e6bf7368af1a
SHA5129b508a82735f618b09dd0ae56f986c763ac5b82ada56fc0a9cd88e9c511989667f2253f8972eadbe2888275802af19dd5dc3dbac5a4b81630e61802891422637
-
Filesize
107KB
MD59f0b9bc54bb73dfb7cf85520da1a08cb
SHA1236f7b770317d782f0817fbf7542140cb1e1526e
SHA2560d44d40e8bda72a3d6ca26665100b256848e2183029a6728c18ad97cd650547f
SHA5128acfb05a7b4723776fa66c0f71bde90dd49243de5dd2a8cf1a1f09a1175f9346c12a717050bff5f3938bda6cc4c610ca1eab75d4b9b7c8bcfb97d9158727a10d
-
Filesize
134KB
MD5b8255a1bc3c307557741d2c99b8256d1
SHA148cc6f3c1a566f06684c5184cf830cbd7db638c2
SHA256796aea9a46fb7704222a7fe1f4e27455b14640c816d6f961344f89dc47537b33
SHA51285f685ad84f2208ad87ff34fb5e99edae50fc938a9335cb9747b7707d237c1b397c318090112eee0e9f04777ee004e26e7377f57c3e31159a96638b65110a69c
-
Filesize
148KB
MD533908aa43ac0aaabc06a58d51b1c2cca
SHA10a0d1ce3435abe2eed635481bac69e1999031291
SHA2564447faacefaba8f040822101e2a4103031660de9139e70ecff9aa3a89455a783
SHA512d5216a53df9cfbe1a78629c103286eb17042f639149c46b6a1cd76498531ae82afd265462fbe0ba9baaff275fc95c66504804f107c449f3fc5833b1ed9c3da46
-
Filesize
257KB
MD5d1f5ce6b23351677e54a245f46a9f8d2
SHA10d5c6749401248284767f16df92b726e727718ca
SHA25657cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc
SHA512960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba
-
Filesize
363KB
MD54a843a97ae51c310b573a02ffd2a0e8e
SHA1063fa914ccb07249123c0d5f4595935487635b20
SHA256727ecf287fb6f4953ee7748913dd559b4f8d3a022fa2ca55bc51cf5886c52086
SHA512905c081552d95b523ecf1155b6c7e157652e5ff00cda30c1c21124d266eb7d305c3398d6832316f403dc45d1b639f1a5a67aea29922cd1a032f52e5247ec55d2
-
Filesize
8KB
MD56e9db340082a1bccb3b4e88111af9b97
SHA181d033d8b03c1dfda1d84198fd85951742fb0352
SHA256f9cad2cbdf748065669a4c395c37406f24486240164325ab2e9cc06445df9b5f
SHA512df5f1d178278d463ef66ffe964f7a88a26e202a8baf595fb3a0358d363ef0e8693e6136999c3f0fc062741873340e24a738936883de955f28b4c3d9e34f85182