Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/11/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00292.7z
Resource
win7-20240903-en
General
-
Target
RNSM00292.7z
-
Size
5.4MB
-
MD5
8a83f8f4b158a2523ad52c6425c8935b
-
SHA1
994680ba0dfb3f6bc0bfc86bbd4de6873709c039
-
SHA256
f0edaec536b41abae2eae5fb2c351a69ea4a54cc9dc6f61901b3549da7e45e32
-
SHA512
92df71a3c67d292de5eda51ce33b567cadbda73adb1615c9231b494bebc25d85fab05b3c9a86595f7222dd46bbc1b119dd2a5cee464c2bc38160fdf8e1918b66
-
SSDEEP
98304:jW7HRUmHm9uEa3p2CAdsO2zJYlWxXnK49Rv+SeWS4Eav1pjE7p/:eR1F/VssO2Ntx649K2EEjE7p/
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+rihou.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/964CFB991126D7F6
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/964CFB991126D7F6
http://5rport45vcdef345adfkksawe.bematvocal.at/964CFB991126D7F6
http://xlowfznrg4wf7dli.onion/964CFB991126D7F6
http://xlowfznrg4wf7dli.ONION/964CFB991126D7F6
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cbvax.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/F584B6F3B95E785D
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/F584B6F3B95E785D
http://yyre45dbvn2nhbefbmh.begumvelic.at/F584B6F3B95E785D
http://xlowfznrg4wf7dli.ONION/F584B6F3B95E785D
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.azlto5.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.xzcfr4.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.asxce4.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.45kgok.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.ad34ft.win/32F6-1C0F-6CE1-0063-7EDD
http://cerberhhyed5frqa.onion/32F6-1C0F-6CE1-0063-7EDD
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Betabot family
-
Cerber 11 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc Process Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} instnm.exe Mutant opened shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe Mutant created shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} bootcfg.exe Mutant opened shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Mutant opened shell.{27CE9C9B-15F1-DC56-E4FD-BD56F41B9C30} Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe -
Cerber family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe -
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Contacts a large (17511) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/1612-270-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1612-268-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1612-267-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3096 bcdedit.exe 2524 bcdedit.exe -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1612-270-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1612-268-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1612-267-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
Renames multiple (4066) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (469) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\bootcfg.exe\"" Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 2197 1684 mshta.exe -
Drops file in Drivers directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\!!!!README_FOR_SAVE FILES.txt.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\SysWOW64\drivers\!!!SAVE YOUR FILES.bmp.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\drivers\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\drivers\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\drivers\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\75i55995suqsm9k.exe Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\75i55995suqsm9k.exe\DisableExceptionChainValidation Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "wsdyg.exe" explorer.exe -
Looks for VMWare services registry key. 1 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VMware cmd.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2664 netsh.exe 2052 netsh.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Drops startup file 12 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\bootcfg.lnk Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\instnm.lnk Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\osk.lnk Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+rihou.txt oleecardpfod.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+cbvax.html jrjyidguupnj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+cbvax.txt jrjyidguupnj.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\instnm.lnk instnm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16924500.lnk Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\16924500.lnk Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+rihou.png oleecardpfod.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+rihou.html oleecardpfod.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+cbvax.png jrjyidguupnj.exe -
Executes dropped EXE 62 IoCs
pid Process 2976 HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe 1772 HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe 1968 HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe 2004 Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe 2020 Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe 1792 Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 1840 Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe 1724 Trojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exe 2740 Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe 912 Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe 1540 Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe 1924 Trojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exe 396 Trojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exe 236 Trojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exe 2352 Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe 2556 Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe 1856 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 2444 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 2764 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe 2808 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 712 Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe 1588 Trojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exe 1752 Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe 2072 Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe 1692 bootcfg.exe 1544 Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe 2472 Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe 708 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 1580 bootcfg.exe 2212 win.exe 408 win.exe 2112 Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe 1692 Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe 1528 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 2624 Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe 2032 instnm.exe 2388 Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe 1920 Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe 2612 oleecardpfod.exe 2620 oleecardpfod.exe 2856 instnm.exe 1580 instnm.exe 1544 Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe 3528 jrjyidguupnj.exe 3668 instnm.exe 3936 instnm.exe 3568 instnm.exe 2876 instnm.exe 1432 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 1888 instnm.exe 2292 bootcfg.exe 1872 instnm.exe 3264 oleecardpfod.exe 3524 oleecardpfod.exe 2456 jrjyidguupnj.exe 1408 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 3292 bootcfg.exe 3188 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 3028 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 3772 bootcfg.exe 3484 bootcfg.exe -
Loads dropped DLL 16 IoCs
pid Process 2004 Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe 2556 Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe 2352 Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe 2072 Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe 2808 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 1544 Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe 2004 Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe 2976 HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe 2500 cmd.exe 2500 cmd.exe 2692 cmd.exe 1548 cmd.exe 3604 cmd.exe 3936 instnm.exe 4088 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RegAsm.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\bootcfg = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\bootcfg.exe\"" Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bootcfg = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\bootcfg.exe\"" Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Firefox = "C:\\ProgramData\\Firefox\\75i55995suqsm9k.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox = "\"C:\\ProgramData\\Firefox\\75i55995suqsm9k.exe\"" DllHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\osk = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\osk.exe\"" Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\mjbiccutrjyr = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\jrjyidguupnj.exe\"" jrjyidguupnj.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\cgueynkjukxi = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\oleecardpfod.exe\"" oleecardpfod.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox = "\"C:\\ProgramData\\Firefox\\75i55995suqsm9k.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox = "\"C:\\ProgramData\\Firefox\\75i55995suqsm9k.exe\"" Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\16924500.lnk" Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\win.exe" win.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\instnm = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\cgueynkjukxi = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\oleecardpfod.exe\"" oleecardpfod.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA instnm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\q: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\o: win.exe File opened (read-only) \??\e: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\i: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\s: win.exe File opened (read-only) \??\u: win.exe File opened (read-only) \??\v: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\h: win.exe File opened (read-only) \??\x: win.exe File opened (read-only) \??\k: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\k: win.exe File opened (read-only) \??\n: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\s: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\x: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\a: win.exe File opened (read-only) \??\v: win.exe File opened (read-only) \??\a: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\l: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\j: win.exe File opened (read-only) \??\m: win.exe File opened (read-only) \??\t: win.exe File opened (read-only) \??\b: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\w: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\y: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\b: win.exe File opened (read-only) \??\n: win.exe File opened (read-only) \??\p: win.exe File opened (read-only) \??\w: win.exe File opened (read-only) \??\z: win.exe File opened (read-only) \??\g: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\m: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\t: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\e: win.exe File opened (read-only) \??\g: win.exe File opened (read-only) \??\i: win.exe File opened (read-only) \??\q: win.exe File opened (read-only) \??\r: win.exe File opened (read-only) \??\h: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\o: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\y: win.exe File opened (read-only) \??\u: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\z: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\l: win.exe File opened (read-only) \??\j: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe File opened (read-only) \??\r: Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\75i55995suqsm9k.exe\DisableExceptionChainValidation Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com 2202 ipinfo.io -
Maps connected drives based on registry 3 TTPs 22 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum DllHost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum DllHost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 IEXPLORE.EXE -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000015d81-86.dat autoit_exe behavioral1/memory/2020-230-0x00000000011F0000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/1544-277-0x00000000011F0000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/1544-278-0x00000000011F0000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/1544-296-0x00000000011F0000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/2020-298-0x00000000011F0000-0x000000000132E000-memory.dmp autoit_exe behavioral1/memory/2212-1322-0x0000000000920000-0x0000000000A5E000-memory.dmp autoit_exe behavioral1/memory/408-1409-0x0000000000920000-0x0000000000A5E000-memory.dmp autoit_exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\LogFiles\SQM\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\Starter\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\ja-JP\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\de-DE\Licenses\OEM\EnterpriseE\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\_Default\Ultimate\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\prnsa002.inf_amd64_neutral_d9df1d04d8cbe336\Amd64\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe File created C:\Windows\SysWOW64\Recovery\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\StarterE\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\HomePremiumN\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\it-IT\Licenses\OEM\Professional\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\UltimateN\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky004.inf_amd64_neutral_5db759db19acd3ae\Amd64\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\wbem\xml\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\de-DE\Licenses\OEM\HomePremiumN\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\en-US\Licenses\_Default\Ultimate\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\de-DE\Licenses\_Default\ProfessionalN\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\it-IT\Licenses\eval\HomePremium\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\it-IT\Licenses\eval\UltimateE\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\it-IT\Licenses\OEM\Ultimate\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\OEM\HomePremiumE\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\WCN\en-US\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\en-US\Licenses\eval\Professional\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\StarterN\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\prnca00g.inf_amd64_neutral_6f76b14b2912fa55\Amd64\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\Professional\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\UltimateE\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\SysWOW64\ticrf.rat.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\fr-FR\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\System32\LogFiles\SQM\SQMLogger.etl.005.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\en-US\Licenses\eval\StarterN\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\WCN\de-DE\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\ProfessionalN\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\de-DE\Licenses\OEM\ProfessionalE\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\SysWOW64\com\!!!!README_FOR_SAVE FILES.txt.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\brmfcwia.inf_amd64_neutral_817b8835aed3d6b7\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\_Default\HomePremiumE\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\prnca00g.inf_amd64_neutral_6f76b14b2912fa55\Amd64\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky003.inf_amd64_neutral_fe7ea176f20ab839\Amd64\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky306.inf_amd64_ja-jp_97f0de39317f6837\Amd64\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\de-DE\Licenses\OEM\UltimateE\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\UltimateE\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\UltimateE\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\HomeBasicN\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TroubleshootingPack\es-ES\!!!SAVE YOUR FILES.bmp.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\de-DE\Licenses\OEM\UltimateN\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\de-DE\Licenses\_Default\Starter\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\StarterE\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\StarterN\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\Enterprise\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky006.inf_amd64_neutral_522043c34551b0c0\Amd64\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe File created C:\Windows\SysWOW64\en-US\Licenses\eval\EnterpriseN\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\Starter\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\EnterpriseN\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\it-IT\Licenses\eval\HomePremium\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TroubleshootingPack\en-US\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\OEM\Ultimate\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\en-US\Licenses\OEM\EnterpriseE\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\en-US\Licenses\OEM\Starter\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\EnterpriseE\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\ProfessionalN\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\HomeBasic\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\OEM\HomeBasicE\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe -
Sets desktop wallpaper using registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3756.bmp" HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\Rondo\\WallpapeR.bmp" Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpA229.bmp" instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\-INSTRUCTION.bmp" Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 61 IoCs
pid Process 3028 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 2876 DllHost.exe 1692 explorer.exe 2764 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe 2876 DllHost.exe 2876 DllHost.exe 2876 DllHost.exe 2764 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe 2764 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe 2764 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe 708 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 708 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 708 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 708 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 1692 explorer.exe 1528 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 1528 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 1528 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 1528 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 3600 DllHost.exe 3600 DllHost.exe 3600 DllHost.exe 3600 DllHost.exe 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 2740 Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe 2740 Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe 2740 Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe 2740 Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 288 cmd.exe 288 cmd.exe 288 cmd.exe 288 cmd.exe -
Suspicious use of SetThreadContext 18 IoCs
description pid Process procid_target PID 2556 set thread context of 2472 2556 Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe 67 PID 2340 set thread context of 2536 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 68 PID 2808 set thread context of 708 2808 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 69 PID 2536 set thread context of 1612 2536 RegAsm.exe 70 PID 2072 set thread context of 2112 2072 Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe 79 PID 2536 set thread context of 1484 2536 RegAsm.exe 81 PID 2004 set thread context of 2624 2004 Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe 82 PID 2444 set thread context of 1528 2444 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 90 PID 1792 set thread context of 2388 1792 Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe 102 PID 912 set thread context of 1920 912 Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe 103 PID 1540 set thread context of 1544 1540 Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe 113 PID 1856 set thread context of 1432 1856 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 104 PID 2612 set thread context of 3264 2612 oleecardpfod.exe 138 PID 2620 set thread context of 3524 2620 oleecardpfod.exe 139 PID 3528 set thread context of 2456 3528 jrjyidguupnj.exe 142 PID 1432 set thread context of 1408 1432 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 145 PID 1408 set thread context of 3188 1408 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 155 PID 3188 set thread context of 3028 3188 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 173 -
resource yara_rule behavioral1/files/0x0006000000015d2a-162.dat upx behavioral1/memory/2020-82-0x00000000011F0000-0x000000000132E000-memory.dmp upx behavioral1/memory/2020-230-0x00000000011F0000-0x000000000132E000-memory.dmp upx behavioral1/memory/1544-277-0x00000000011F0000-0x000000000132E000-memory.dmp upx behavioral1/memory/1544-278-0x00000000011F0000-0x000000000132E000-memory.dmp upx behavioral1/memory/1544-296-0x00000000011F0000-0x000000000132E000-memory.dmp upx behavioral1/memory/1544-294-0x0000000003EB0000-0x0000000003FEE000-memory.dmp upx behavioral1/memory/2020-298-0x00000000011F0000-0x000000000132E000-memory.dmp upx behavioral1/memory/2212-1322-0x0000000000920000-0x0000000000A5E000-memory.dmp upx behavioral1/memory/408-1409-0x0000000000920000-0x0000000000A5E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Office14\_RECoVERY_+cbvax.html jrjyidguupnj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\Recovery+rihou.png oleecardpfod.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double.png oleecardpfod.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Recovery+rihou.html oleecardpfod.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_RECoVERY_+cbvax.txt jrjyidguupnj.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\Recovery+rihou.html oleecardpfod.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00090_.GIF.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-today.png jrjyidguupnj.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_RECoVERY_+cbvax.txt jrjyidguupnj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_s.png jrjyidguupnj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101864.BMP.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\VIEW.CSS.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Common Files\System\msadc\Recovery+rihou.html oleecardpfod.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\Recovery+rihou.txt oleecardpfod.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_ButtonGraphic.png jrjyidguupnj.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\!!!!README_FOR_SAVE FILES.txt oleecardpfod.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png jrjyidguupnj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXLIRMV.XML.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Recovery+rihou.html oleecardpfod.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\Recovery+rihou.html oleecardpfod.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21321_.GIF.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\bg.pak oleecardpfod.exe File created C:\Program Files\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormToolImages.jpg.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\Recovery+rihou.html oleecardpfod.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Premium.css.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02736G.GIF.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-crescent_partly-cloudy.png jrjyidguupnj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387591.JPG.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\Recovery+rihou.png oleecardpfod.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_RECoVERY_+cbvax.html jrjyidguupnj.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\VelvetRose.css.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\Recovery+rihou.png oleecardpfod.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\!!!!README_FOR_SAVE FILES.txt oleecardpfod.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_RECoVERY_+cbvax.html jrjyidguupnj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\Recovery+rihou.txt oleecardpfod.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21319_.GIF.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\Recovery+rihou.txt oleecardpfod.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\_RECoVERY_+cbvax.html jrjyidguupnj.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-api.xml.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\_RECoVERY_+cbvax.txt jrjyidguupnj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\Recovery+rihou.png oleecardpfod.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\Recovery+rihou.txt oleecardpfod.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png oleecardpfod.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\_RECoVERY_+cbvax.txt jrjyidguupnj.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_RECoVERY_+cbvax.html jrjyidguupnj.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\TAB_ON.GIF.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\Recovery+rihou.png oleecardpfod.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\_RECoVERY_+cbvax.png jrjyidguupnj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576black.png jrjyidguupnj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\720x480icongraphic.png jrjyidguupnj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\Recovery+rihou.html oleecardpfod.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_RECoVERY_+cbvax.png jrjyidguupnj.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)greenStateIcon.png oleecardpfod.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_microsoft-windows-s..mmaintenanceservice_31bf3856ad364e35_6.1.7601.17514_none_9b73f7b9f6d6dd18\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_netfx-aspnet_uninstallsqlstatetem_b03f5f7f11d50a3a_6.1.7600.16385_none_d929c51176e9aa64\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1033\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-e..gadgetxml.resources_31bf3856ad364e35_6.1.7600.16385_es-es_901b335e29d329ab\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-fax-common.resources_31bf3856ad364e35_6.1.7600.16385_en-us_a5a3b35650610173\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..-calendar.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_dc373b8a3c1190f9\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Workflow Foundation\SQL\en\SqlPersistenceService_Schema.sql.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-bits-perf_31bf3856ad364e35_6.1.7601.17514_none_914aa0fa1749a409\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-l..-ultimate.resources_31bf3856ad364e35_6.1.7601.17514_es-es_d5c9b9e4fbbebe76\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-l..mepremium.resources_31bf3856ad364e35_6.1.7601.17514_es-es_7c853394c0bca3ad\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..omebasicn.resources_31bf3856ad364e35_6.1.7600.16385_de-de_72e9145f89673890\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-l..epremiume.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aabbd313996cd418\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..econsumer.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_4080c452718ce6e7\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..-startern.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_cba7de0579ce6a2f\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-odbclogging_31bf3856ad364e35_6.1.7600.16385_none_3a95043523dddbb9\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..-calendar.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_0c66155a4e01171c\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..ets-slideshowgadget_31bf3856ad364e35_6.1.7600.16385_none_253e8c58002c48e1\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-gadgets-weather_31bf3856ad364e35_6.1.7600.16385_none_4db0b909695af8f9\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_wwf-cperfcnt_31bf3856ad364e35_6.1.7600.16385_none_1f7373be61daf614\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\SubsetList\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-l..nterprise.resources_31bf3856ad364e35_6.1.7601.17514_it-it_020311c19a38c0a8\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-maintenancediagnostic_31bf3856ad364e35_6.1.7600.16385_none_e5e3f53c23550761\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\darkBlue_GRAD.jpg.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1029\eula.rtf.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-winre-recoveryagent_31bf3856ad364e35_6.1.7601.17514_none_bcd407cfce259313\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-dxp-deviceexperience_31bf3856ad364e35_6.1.7601.17514_none_a54b31331066c8e2\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-l..m-starter.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_be24152864a354e5\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..essionale.resources_31bf3856ad364e35_6.1.7601.17514_en-us_6cfcb6c3e1697b1c\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-t..ied-chinese-quanpin_31bf3856ad364e35_6.1.7600.16385_none_f79af98021986eab\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\de-DE\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe.config.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\inf\PERFLIB\0409\perfi.dat.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_personalization_sql_b03f5f7f11d50a3a_6.1.7600.16385_none_d5842bb2904185f4\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\wow64_microsoft-windows-p..ll-preloc.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_56cc3687acc564e8\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..ets-slideshowgadget_31bf3856ad364e35_6.1.7600.16385_none_253e8c58002c48e1\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..epremiumn.resources_31bf3856ad364e35_6.1.7601.17514_it-it_4a940280a6fac951\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..nterprise.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_58ca5f28a2c7f485\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\Windows Workflow Foundation\SQL\ja\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-codeintegrity_31bf3856ad364e35_6.1.7601.17514_none_fe9df6ad1b5f6e87\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\Speech\Engines\SR\en-GB\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..eraccount.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8a4202a45063c41a\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-rasctrs_31bf3856ad364e35_6.1.7600.16385_none_70130a6690196ee7\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_wcf-m_svc_mod_op_perf_c_h_31bf3856ad364e35_6.1.7600.16385_none_564b5f0e0709e9c5\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\wow64_microsoft-windows-p..ll-preloc.resources_31bf3856ad364e35_6.1.7600.16385_de-de_7f0b185800a159c3\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..ultimaten.resources_31bf3856ad364e35_6.1.7601.17514_de-de_e8b1cd6d3eb1f17c\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_netfx-aspnet_webmedtrust_config_b03f5f7f11d50a3a_6.1.7600.16385_none_00ea0373d94333a0\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallCommon.sql.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\web_lowtrust.config.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-w..ar-wizard.resources_31bf3856ad364e35_6.1.7600.16385_de-de_970a7644dc297d48\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7601.17514_none_678566b7ddea04a5\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-t..d-chinese-shuangpin_31bf3856ad364e35_6.1.7600.16385_none_7aab2462f08e2d02\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..epremiume.resources_31bf3856ad364e35_6.1.7601.17514_es-es_0eca880e968e1432\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..zlegadget.resources_31bf3856ad364e35_6.1.7600.16385_es-es_a5f3b7a6a481da29\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..-startern.resources_31bf3856ad364e35_6.1.7600.16385_en-us_9244c0bd2ede2f06\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\x86_microsoft-windows-l..nterprise.resources_31bf3856ad364e35_6.1.7601.17514_en-us_1939ad1417b061ed\!!!!README_FOR_SAVE FILES.txt Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\App_Data\GroupedProviders.xml.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SplashScreen.bmp.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe File opened for modification C:\Windows\inf\ServiceModelService 3.0.0.0\_ServiceModelServicePerfCounters.h.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-printerdiagnostic_31bf3856ad364e35_6.1.7600.16385_none_21b432d7b46a7554\ Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Graphics\Rotate4.ico.sVn Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe File created C:\Windows\winsxs\amd64_microsoft-windows-winre-recoveryagent_31bf3856ad364e35_6.1.7601.17514_none_18f2a35386830449\!!!SAVE YOUR FILES.bmp Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\win.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language instnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oleecardpfod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language instnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language instnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrjyidguupnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language instnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language instnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oleecardpfod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootcfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 11 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3728 PING.EXE 1256 cmd.exe 2696 PING.EXE 2300 cmd.exe 1360 cmd.exe 2616 cmd.exe 1632 PING.EXE 2612 cmd.exe 2360 PING.EXE 3112 cmd.exe 1296 PING.EXE -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4000 vssadmin.exe -
Kills process with taskkill 7 IoCs
pid Process 2464 taskkill.exe 3792 taskkill.exe 2512 taskkill.exe 2700 taskkill.exe 2636 taskkill.exe 536 taskkill.exe 3564 taskkill.exe -
Modifies Control Panel 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\bootcfg.exe\"" Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{1591EC7F-A229-1145-B746-F357D6852359}\\instnm.exe\"" instnm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" explorer.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{722F4B51-A50E-11EF-A5CD-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000093cd5b2ee72502ae947d4adf4c93df88b1a6b314b27e49a21f2c4f608642e898000000000e80000000020000200000003a66d6d01ede0a6f0384ac845b4e5f01c4fa8b969fbfa28844525272a3be41932000000065cdc8cc79841af253d58955bdcc9f231c8b297659fdf9ea9febdd81c758168340000000a9fbf629fa978cd57a99258d1a8edf8afd3c12c40e5ae4a70979fd5c77f6f03a8949f2a1d0ae698ac6016948137124bdaddafee35c51222cae6ec4857af61fd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438028561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40dfd43e1b39db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\00292\winmgmts:\localhost\root\SecurityCenter2 win.exe File created C:\Users\Admin\AppData\Roaming\win.exe:Zone.Identifier cmd.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 1924 NOTEPAD.EXE 3440 NOTEPAD.EXE 3892 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 2696 PING.EXE 2360 PING.EXE 1296 PING.EXE 3728 PING.EXE 1632 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 25 IoCs
pid Process 2976 HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe 1968 HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe 1772 HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe 2004 Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe 2020 Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe 912 Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe 1792 Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe 1540 Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 1856 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 1840 Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe 2444 Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe 1724 Trojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exe 2764 Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe 2740 Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe 2808 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 1924 Trojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exe 712 Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe 396 Trojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exe 1588 Trojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exe 236 Trojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exe 1752 Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe 2352 Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe 2072 Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe 2556 Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 2020 Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 2212 win.exe 996 taskmgr.exe 996 taskmgr.exe 1484 RegAsm.exe 996 taskmgr.exe 996 taskmgr.exe 408 win.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 996 taskmgr.exe -
Suspicious behavior: MapViewOfSection 34 IoCs
pid Process 2556 Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe 2808 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 2072 Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe 3028 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 3028 Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 708 Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe 1692 explorer.exe 1692 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1840 Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2080 7zFM.exe Token: 35 2080 7zFM.exe Token: SeSecurityPrivilege 2080 7zFM.exe Token: SeDebugPrivilege 996 taskmgr.exe Token: SeDebugPrivilege 2352 Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe Token: SeDebugPrivilege 1692 bootcfg.exe Token: SeDebugPrivilege 2536 RegAsm.exe Token: SeDebugPrivilege 2512 taskkill.exe Token: SeDebugPrivilege 1580 bootcfg.exe Token: SeShutdownPrivilege 2976 HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe Token: SeDebugPrivilege 1692 Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 2624 Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe Token: SeDebugPrivilege 2636 taskkill.exe Token: SeDebugPrivilege 536 taskkill.exe Token: SeDebugPrivilege 2388 Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe Token: SeDebugPrivilege 1920 Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe Token: SeDebugPrivilege 1544 Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe Token: SeDebugPrivilege 3936 instnm.exe Token: SeBackupPrivilege 2576 vssvc.exe Token: SeRestorePrivilege 2576 vssvc.exe Token: SeAuditPrivilege 2576 vssvc.exe Token: SeDebugPrivilege 3568 instnm.exe Token: SeDebugPrivilege 2876 instnm.exe Token: SeDebugPrivilege 1888 instnm.exe Token: SeIncreaseQuotaPrivilege 2488 wmic.exe Token: SeSecurityPrivilege 2488 wmic.exe Token: SeTakeOwnershipPrivilege 2488 wmic.exe Token: SeLoadDriverPrivilege 2488 wmic.exe Token: SeSystemProfilePrivilege 2488 wmic.exe Token: SeSystemtimePrivilege 2488 wmic.exe Token: SeProfSingleProcessPrivilege 2488 wmic.exe Token: SeIncBasePriorityPrivilege 2488 wmic.exe Token: SeCreatePagefilePrivilege 2488 wmic.exe Token: SeBackupPrivilege 2488 wmic.exe Token: SeRestorePrivilege 2488 wmic.exe Token: SeShutdownPrivilege 2488 wmic.exe Token: SeDebugPrivilege 2488 wmic.exe Token: SeSystemEnvironmentPrivilege 2488 wmic.exe Token: SeRemoteShutdownPrivilege 2488 wmic.exe Token: SeUndockPrivilege 2488 wmic.exe Token: SeManageVolumePrivilege 2488 wmic.exe Token: 33 2488 wmic.exe Token: 34 2488 wmic.exe Token: 35 2488 wmic.exe Token: SeIncreaseQuotaPrivilege 2488 wmic.exe Token: SeSecurityPrivilege 2488 wmic.exe Token: SeTakeOwnershipPrivilege 2488 wmic.exe Token: SeLoadDriverPrivilege 2488 wmic.exe Token: SeSystemProfilePrivilege 2488 wmic.exe Token: SeSystemtimePrivilege 2488 wmic.exe Token: SeProfSingleProcessPrivilege 2488 wmic.exe Token: SeIncBasePriorityPrivilege 2488 wmic.exe Token: SeCreatePagefilePrivilege 2488 wmic.exe Token: SeBackupPrivilege 2488 wmic.exe Token: SeRestorePrivilege 2488 wmic.exe Token: SeShutdownPrivilege 2488 wmic.exe Token: SeDebugPrivilege 2488 wmic.exe Token: SeSystemEnvironmentPrivilege 2488 wmic.exe Token: SeRemoteShutdownPrivilege 2488 wmic.exe Token: SeUndockPrivilege 2488 wmic.exe Token: SeManageVolumePrivilege 2488 wmic.exe Token: 33 2488 wmic.exe Token: 34 2488 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2080 7zFM.exe 2080 7zFM.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 2340 Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe 996 taskmgr.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 1792 Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe 912 Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe 1752 Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe 2032 instnm.exe 2612 oleecardpfod.exe 2620 oleecardpfod.exe 2856 instnm.exe 1580 instnm.exe 3668 instnm.exe 1872 instnm.exe 2452 iexplore.exe 2452 iexplore.exe 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3872 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3340 IEXPLORE.EXE 3884 IEXPLORE.EXE 3884 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 7 IoCs
pid Process 2352 Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe 1692 bootcfg.exe 1580 bootcfg.exe 2292 bootcfg.exe 3292 bootcfg.exe 3772 bootcfg.exe 3484 bootcfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 576 wrote to memory of 2976 576 cmd.exe 34 PID 576 wrote to memory of 2976 576 cmd.exe 34 PID 576 wrote to memory of 2976 576 cmd.exe 34 PID 576 wrote to memory of 2976 576 cmd.exe 34 PID 576 wrote to memory of 1968 576 cmd.exe 35 PID 576 wrote to memory of 1968 576 cmd.exe 35 PID 576 wrote to memory of 1968 576 cmd.exe 35 PID 576 wrote to memory of 1968 576 cmd.exe 35 PID 576 wrote to memory of 1772 576 cmd.exe 36 PID 576 wrote to memory of 1772 576 cmd.exe 36 PID 576 wrote to memory of 1772 576 cmd.exe 36 PID 576 wrote to memory of 1772 576 cmd.exe 36 PID 576 wrote to memory of 2004 576 cmd.exe 37 PID 576 wrote to memory of 2004 576 cmd.exe 37 PID 576 wrote to memory of 2004 576 cmd.exe 37 PID 576 wrote to memory of 2004 576 cmd.exe 37 PID 576 wrote to memory of 2020 576 cmd.exe 38 PID 576 wrote to memory of 2020 576 cmd.exe 38 PID 576 wrote to memory of 2020 576 cmd.exe 38 PID 576 wrote to memory of 2020 576 cmd.exe 38 PID 576 wrote to memory of 912 576 cmd.exe 39 PID 576 wrote to memory of 912 576 cmd.exe 39 PID 576 wrote to memory of 912 576 cmd.exe 39 PID 576 wrote to memory of 912 576 cmd.exe 39 PID 576 wrote to memory of 1792 576 cmd.exe 40 PID 576 wrote to memory of 1792 576 cmd.exe 40 PID 576 wrote to memory of 1792 576 cmd.exe 40 PID 576 wrote to memory of 1792 576 cmd.exe 40 PID 576 wrote to memory of 1540 576 cmd.exe 41 PID 576 wrote to memory of 1540 576 cmd.exe 41 PID 576 wrote to memory of 1540 576 cmd.exe 41 PID 576 wrote to memory of 1540 576 cmd.exe 41 PID 576 wrote to memory of 2340 576 cmd.exe 42 PID 576 wrote to memory of 2340 576 cmd.exe 42 PID 576 wrote to memory of 2340 576 cmd.exe 42 PID 576 wrote to memory of 2340 576 cmd.exe 42 PID 576 wrote to memory of 1856 576 cmd.exe 43 PID 576 wrote to memory of 1856 576 cmd.exe 43 PID 576 wrote to memory of 1856 576 cmd.exe 43 PID 576 wrote to memory of 1856 576 cmd.exe 43 PID 576 wrote to memory of 1840 576 cmd.exe 44 PID 576 wrote to memory of 1840 576 cmd.exe 44 PID 576 wrote to memory of 1840 576 cmd.exe 44 PID 576 wrote to memory of 1840 576 cmd.exe 44 PID 576 wrote to memory of 2444 576 cmd.exe 45 PID 576 wrote to memory of 2444 576 cmd.exe 45 PID 576 wrote to memory of 2444 576 cmd.exe 45 PID 576 wrote to memory of 2444 576 cmd.exe 45 PID 576 wrote to memory of 1724 576 cmd.exe 46 PID 576 wrote to memory of 1724 576 cmd.exe 46 PID 576 wrote to memory of 1724 576 cmd.exe 46 PID 576 wrote to memory of 1724 576 cmd.exe 46 PID 576 wrote to memory of 2764 576 cmd.exe 47 PID 576 wrote to memory of 2764 576 cmd.exe 47 PID 576 wrote to memory of 2764 576 cmd.exe 47 PID 576 wrote to memory of 2764 576 cmd.exe 47 PID 576 wrote to memory of 2740 576 cmd.exe 48 PID 576 wrote to memory of 2740 576 cmd.exe 48 PID 576 wrote to memory of 2740 576 cmd.exe 48 PID 576 wrote to memory of 2740 576 cmd.exe 48 PID 576 wrote to memory of 2808 576 cmd.exe 49 PID 576 wrote to memory of 2808 576 cmd.exe 49 PID 576 wrote to memory of 2808 576 cmd.exe 49 PID 576 wrote to memory of 2808 576 cmd.exe 49 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System jrjyidguupnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" jrjyidguupnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System oleecardpfod.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" oleecardpfod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System oleecardpfod.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" oleecardpfod.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1080
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00292.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2080
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exeHEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe3⤵
- Cerber
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2664
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2052
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___KM4CCOT_.hta"4⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:1684
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___LIZZ_.txt4⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"6⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:3936 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:4000
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no7⤵
- Modifies boot configuration data using bcdedit
PID:3096
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures7⤵
- Modifies boot configuration data using bcdedit
PID:2524
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt7⤵PID:1288
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"7⤵PID:1744
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "instnm.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe" > NUL7⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3112 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "instnm.exe"8⤵
- Kills process with taskkill
PID:3564
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1296
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe"5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2360
-
-
-
-
C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exeHEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe3⤵
- Cerber
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1968
-
-
C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exeHEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe3⤵
- Cerber
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1772
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exeTrojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2004 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exeTrojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe4⤵
- Cerber
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe" > NUL5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe"6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exeTrojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exeC:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\delph1.dat"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C echo. > "C:\Users\Admin\AppData\Roaming\win.exe":Zone.Identifier5⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2128 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1580
-
-
-
C:\Users\Admin\AppData\Roaming\win.exeC:\Users\Admin\AppData\Roaming\win.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Users\Admin\AppData\Roaming\win.exeC:\Users\Admin\AppData\Roaming\win.exe /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\delph1.dat"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exeTrojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:912 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exeTrojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\oleecardpfod.exeC:\Windows\oleecardpfod.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Windows\oleecardpfod.exeC:\Windows\oleecardpfod.exe6⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System policy modification
PID:3264 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive7⤵PID:2424
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT7⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM7⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:28⤵
- Looks for VMWare services registry key.
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:209933 /prefetch:28⤵
- Looks for VMWare services registry key.
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3872
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:472072 /prefetch:28⤵
- Looks for VMWare services registry key.
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:6042630 /prefetch:28⤵
- Looks for VMWare services registry key.
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3340
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive7⤵PID:3724
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\OLEECA~1.EXE7⤵PID:3872
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00292\TR15D4~1.EXE5⤵
- Loads dropped DLL
PID:2692 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exeTrojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exeTrojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\oleecardpfod.exeC:\Windows\oleecardpfod.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Windows\oleecardpfod.exeC:\Windows\oleecardpfod.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- System policy modification
PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00292\TRA4A5~1.EXE5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exeTrojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1540 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exeTrojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1544 -
C:\Windows\jrjyidguupnj.exeC:\Windows\jrjyidguupnj.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3528 -
C:\Windows\jrjyidguupnj.exeC:\Windows\jrjyidguupnj.exe6⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System policy modification
PID:2456 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:2832
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT7⤵
- Opens file in notepad (likely ransom note)
PID:3892
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive7⤵PID:380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\JRJYID~1.EXE7⤵PID:2084
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00292\TR1C27~1.EXE5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3668 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exeTrojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2340 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /stext C:\ProgramData\Mails.txt5⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" /stext C:\ProgramData\Browsers.txt5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exeTrojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1856 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1408 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3188 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe"7⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Checks whether UAC is enabled
- Indicator Removal: Clear Persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
PID:3028 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:1692
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exeTrojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: RenamesItself
PID:1840 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe"4⤵
- Loads dropped DLL
PID:4088 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\instnm.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exeTrojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2444 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe"C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe"4⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1528
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exeTrojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1724
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exeTrojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2764
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exeTrojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe3⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2740
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exeTrojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2808 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exeTrojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe4⤵
- Looks for VMWare services registry key.
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: MapViewOfSection
PID:708 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysEC81.tmp"5⤵
- Looks for VMWare services registry key.
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:288
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exeTrojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1924
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exeTrojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe3⤵
- Cerber
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:712
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exeTrojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:396
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exeTrojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1588
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exeTrojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:236
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exeTrojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exeTrojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe4⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe" > NUL5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2300 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exeTrojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe3⤵
- Cerber
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2352 -
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe"C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe"4⤵
- Cerber
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1692
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe" > NUL4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2612 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.jcb-88143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc.exe"5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2696
-
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exeTrojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2072 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exeTrojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe4⤵
- Cerber
- Executes dropped EXE
PID:2112
-
-
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exeTrojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2556 -
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exeTrojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe4⤵
- Cerber
- Executes dropped EXE
PID:2472
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:996
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1176
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1628
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2300
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
C:\Windows\system32\taskeng.exetaskeng.exe {C9905746-5505-49D6-8B41-4B921D3E0759} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵PID:2008
-
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exeC:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2292
-
-
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exeC:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3292
-
-
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exeC:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3772 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2464
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3728
-
-
-
-
C:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exeC:\Users\Admin\AppData\Roaming\{1591EC7F-A229-1145-B746-F357D6852359}\bootcfg.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3484 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "" > NUL & ping -n 1 127.0.0.1 > NUL & del "" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1256 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im ""4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3792
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1632
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Looks for VMWare services registry key.
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3600
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- Looks for VMWare services registry key.
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2876
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc01⤵PID:628
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "18579336744731117219650543981942813216-1998233078-368492015-651191836-1473456413"1⤵PID:3700
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1409157295574511187-1500515187618108376-1913471434584013360-112741654474481855"1⤵PID:892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
2Indicator Removal
4Clear Persistence
1File Deletion
3Modify Registry
9Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
2Peripheral Device Discovery
2Query Registry
5Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51a03ae66cfa248b0880d9db0326e420d
SHA13a4efcefcb55790731b389fdb091d2beb0bb26a3
SHA2567bf0502aa002b25dd493d786e865bd49c306fdc19990383f08ac089ec5678d2d
SHA51212a18977db01cfb35dbc587f4c2b6fec0ae42efd9dc3beeb956dce68d149f1c6d60f8df3e9e359195ce017a245b1f7d1c209eb82c885394377a66574bca333b8
-
Filesize
7KB
MD5e4fcbddb4af9f720d77ebe9c9c36ea57
SHA18cc8b88f9ca9e4b7bcaacb0d779ac3e056030823
SHA256aa4e081d1820976a74f8671dd197e69da65f3a56728d7a3212211656832d261e
SHA51236d622c08ba523d5161763ce7915e0cac41dcf3c7d1addb797ab9d19f010f08695896cc11ddc3deb6bb64d17dc0131ff63a638b8072a5c0b228a074d9370fa09
-
Filesize
65KB
MD5a95ffe0f4f0a1f4b3503fc6eb46a9572
SHA134edddadf8d5844218f61b449b07f43a33a82a90
SHA256d53e075921465056945b1cc05a0dea9b07b0e30b538b604ddf94029f06dfd5ac
SHA512873a5b6076b60045d502464d6e045423f20690ec2e1d4db6fa96ffba055130b6a1d3992b1da5676e5c2a054363d55a59ae99043c4cdb8e40a6877ce66282be79
-
Filesize
1KB
MD5a849bbcf40e9aeb5b2490e53b528e4fa
SHA165406f37a4a466c2fee46025578c7ede38f14b9b
SHA256f4770dde64112ac804b8c6772b770ef13d031beb524f4e018ab488592913e2fc
SHA5125c7a2e1150000b88522b945786e19cfbd4d6633e856217d72c0b6615c14461867d8a678cec721520a35d9a22ac4fc820fb08b25984a8c476d9cbfafa93cc57e6
-
Filesize
12KB
MD54e92920fb52861014c1295124ab2e17d
SHA1864022a907e4eb7344769a684e8d2058ccf32937
SHA256bf565185f239a5b709eee71648fcc5cb4c1b9077b613a227dbf3a4d5f21f2b24
SHA512b2927e0b445f1ef265b26c653a1cb6fad17e10c02fb7b7ad564fab39159c721b258e21d2e05b26f6526baeb227810a3d8445eef06e439405dab7b84570812020
-
Filesize
64KB
MD55eceb425740c53503edb5df38120face
SHA18d621b30238713f9d4f74bdd6d4fe3eff3bc665e
SHA256f1f94c0a5ca1ed086159e1f7744a2a3642ed81dc88672d9b4eed7bc1e069e8d8
SHA51252b213d3d1b0c382843dc99870344215fef224c69683b4a3f6f3d3ff660f2eb1b452c29c607634e78f63cac475899e47fde2d94e4f54c60cc02bd64c072e7204
-
Filesize
1KB
MD5f6ddc74fa452ab08dec743eb61900fd5
SHA1c9563cdf930b975000131d1d48d8d2c72c9ecf21
SHA25611ab5e0ececc032837de7d948b43db7329eabc155f99945c31dcd3fd10c69dcf
SHA512d5acd52b66ed0fb9f78922dfd5e31843bdb05eff6c8e45a40b10affc0f326a7af83e6b5a5db80bbbb6c7b7795fcd9eb3ca0716370095c907c24ef56075f221d3
-
Filesize
12KB
MD5467cf35479f4ccd6d0ab713e5b37378e
SHA1b5976f5fbb6d13154c51fb1d114bab628fe882ed
SHA25628be20fe7213cbffd4e99fca59a7b122db375dbb104b6bf97f42646989f13435
SHA5129826d603d212ca871772ee2ac908bdf9e75d799e12b5cc998f6805ae513797ea5031fd7d3bbecadb6f3c2b0ca24c5e1e65f26d1ec870da04291fa88d4fa0d681
-
Filesize
10KB
MD5d462f5955a8fb2a2f414cc4df2c80ccf
SHA1a1a1da3b6e8bdd15f524d039c6210d8b1ec6ebaa
SHA256ae6c0ae29bd9cdd353ddbef8b433e3af624442bb10e7b8d1354a50fb7a257a79
SHA5129f47fbd09f48361e356306a8f498161d7c4085df3d9f3e892e4e0999daa22ccad880e0d2c707617854d3e4da7efc49f8669ca4f2784da4053ac9e832e2dcee95
-
Filesize
85B
MD52f9c7712e05616ebde2788fa8a097e00
SHA187a4367fd5f32a99c640d8b427f0eda8142ed349
SHA256f2b08cff11788baf0b70452d3d8e358b066ac390a4457120b325a8fcda016a8d
SHA51224daf65f6fc1dbfc7e0217f0e2c05afdc217e6d968cb82b8a154e19179aab5d1cb169f2c20ca7b35d7bda8f4019b0e616bb4e304cc25e685da6aa7ff5a531d0c
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
Filesize
784B
MD52fcd4c919128bb1bd7f83fbca422f380
SHA17ae4d5cd092816cb998bc45f8b1c23f175cfd275
SHA256ca6cc13db11ac024e38ceef6975bf0cfcaeebffed320378f53d19de5ff6ee4fb
SHA5128d04df2211fb5398d260a473cb9e64ce60f2dce993251c248b3f45fd968d74b728fdef224b46d796c713a8122597fb83fd1dc7fc2f1681139ebc0e4b0254457b
-
Filesize
3.5MB
MD53cee5765afc0092d779f83dd8ffac47a
SHA116b9f49472b71dd7e05d12735407f7b2356f9ef2
SHA2560a15eeec75479d478d846368e6c6f5ed9cf7a07bd9cd9401845f33a6a7db9b46
SHA51270006c779626b0f52bf29dc870b46585eec853c24ea2a51e1ccd18f9116d727b6a10740e3d8d1b1eccf463eef0989dfce6b5d335a5968e00611bd9f91c0faa47
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_OFF.GIF.sVn
Filesize617B
MD51ce68fc34afcb128b1ede58896de3cb8
SHA15268bc35031ab0eefc9d8fb97a66772d863593a1
SHA256b58d5f8a2945e2b76f672924bae97cda5b241d2c8c7c3bd8f3dc87ee2e2e7913
SHA512dc6b4cf5900a22e5fade0ee5396f419b1b21934983265fe67423038a62c359e7270b6960502638426d1c3b4d17a9ab30f7523b31a4ceff614bca6e3d46b0be8a
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_ON.GIF.sVn
Filesize489B
MD5ec963fc0dab111b8876296eab5b74ab7
SHA1b87a80f96234fd60bfe77bd9ff8b3276c390168d
SHA256a9271b93dd4b109e6f8e2160f5d88bc86bb623340f1805b17b29029a930b8465
SHA512812c4d4c1aa35debb9a75da6c6f01197bb01e094bb94ce81cad90b0cf6ab6d1dd9715a8d934878a6e73f1fc51c53acd38d7d7ec307fd11167ab1782105d2da9b
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.sVn
Filesize457B
MD50127662b44df0505d6838656c2c0dde5
SHA1d08d21d98857cca41cf6949bbeb1f902e95c8764
SHA2562d175c848d81986b63daf4eacaad2d9d88a9eca2563c52610bcd91e8011067a2
SHA5129f2a5158ea94dfef8b6ce0a21897f3ee21c34c8a147311b974eeb58a1e07cddaf4df70e50dd369a54d76a113edd23d350b214482851abf5ad2d21bfa9b90889a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.sVn
Filesize777B
MD5722afa805fac458f6b3d7773cd891d51
SHA15512b3a3c3e190fdf412aec9d3e9e94aaa29cafb
SHA25607b8f1b3ab6e693cc4fc95ce0d597893b93672bbc8cceafd00236e6f1866edd5
SHA5123f33613f55d0031caae450093990a607c4d56e385050e4e2f912b5c945f984f43d0347b4d8d3476ba0546231091de9ef9d78df7d30456fd9103799ba5fac7b4a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.sVn
Filesize1KB
MD53efb437b05cf9a4b56b334ece7f0f808
SHA13ad6986d39b869d7711ee69261e2a4a7917f1d9a
SHA256fbe1e237ab4112c2f8865d551631aec06f15d6d6d0e611dbbdd62fdd0d95697a
SHA51273b1c046378b3bee72305ca40a97cdd27174cf0298f5028cc31d47d846fc7a73598f94178bf4065ff5300204ff617dfeaa5473db5ceda7e4d0a70901b4524eb2
-
Filesize
1KB
MD52e396f1b61fbb64031867836c2b1bf28
SHA167c6617c384958afded47eb57f75c726a6dc2b0c
SHA2564a15c8a15157f84f3d7e9752f04b7c14eb83d54046f32ba193c7b65759107431
SHA5124ff03b962700aef400a2966966fb49d3541cc57a4d92599baa915816968d5e4b6c55014f904a3016af9c30158786e5ef68524571e13cea9327a6a736f945904a
-
Filesize
425B
MD511be87410f108ccd7e29f5676369ff19
SHA111c96012840d5eb3d76a6bfc6f30382f9bb7fbf6
SHA256ef77c274cfaa34c0e990f74f7a6c85776029791e1cea6b35587374e504361373
SHA51253cf9d965d2db8a9863a34cb2bb5bb6d1fb14af745627eb0554b7895efcee0de192296c2cc9a92a6eac76dce5b9ff7d911e9e6392a182f8f427b1be7dd3f1835
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.sVn
Filesize12KB
MD5b5156e9413ad22d0ecb0cc87ac5acd4d
SHA1a9c22db665040c1cd41e8857953526d6f82e715b
SHA2566940a84c88fb4b59d7790d79a261129a060b3a3b92cb526fc86c3b6a2dae07f2
SHA5123d3ba24dacf44663265fabb37fc563fc46aa9bcdc5b8081676adcdfd565e8ca57d0487e02b48400b13a84489822c15787d26911063769a95bb6fc1f7dd19dc60
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html.sVn
Filesize9KB
MD567eb2e9ec313b1d91834d822508d99f5
SHA18f785a9313ae25564ede0ec6dc77197b85097819
SHA25695810d8767688c14cd83edd90191af6c9930fd00a327441bbadc7d0bc80dc767
SHA512888ffc00cc7ca8a08543e62f1d3a97a4149585d561abcef0933158f03033c85af5b914e891bd9be4234c4a5972195eb11c24e47ad6526d8754dcb5e4cda988f0
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD577e9247ccb20b3a2fdccc3dbf3421b5b
SHA129d3549f979ecccba0f00780b28c8fe3b952429f
SHA256d2aabc9db53788c7b490c06277444da94bddb06cb56c8a63444eafe69c0bd183
SHA5125c209e7377aac11a5376fd2ab6d44e64e59fd1a523b63a8e9de4cb41ebb8c01e43d0366bc612ea99259003bb5520b18e68640c59fca60bfa6c27a3bef91b24ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a0bf5f754a046419a9e44b69fa0e08
SHA123f4c5ff138e49eecc95bd91660ef4d033b6eebf
SHA2568c42586e43703cac75dfbe725028d392e2481ab75d6e23c32510181aa2116971
SHA5123d9b8c7d56e897f945b29f74cfadc1e6439b20f5532a0c25e06bcc7dff591534e2bfaf210d96dead69882a80f9ef8fbf29c0479e158a17dfc496da083f234407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edd0c4ed00e58aae7c0658d18974e10
SHA1f5b25e77a2bfa5f6440d8e7671e01f0546661763
SHA256b4c84bf30f2ea7fab0cfc48c6e5d3d815b82829f8123c8d5ee33b66b6b332d0b
SHA512a6482132195adf8bf3298d91897899ed23473af7475b8a0b148113e7a9336903c4443201ef69d692cbe66237f205cf1f1273cbe3965316a505a7f9fec9f70708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e104dc53a705daf5126ef85d115461
SHA14b1aedb94fecc6a2bc282febc8b1a3ccca6aa8bd
SHA256866834770abaacb518e815c0b6b9dccfa7630207415668e48f4997999969292d
SHA5125cb4a98a0eddff7bac55eab3efc35c0ee52c2fca4fdd2f6089f188fdc303af611dd29f8deb354567fec041eb67b2a48d6b55caa1dfa1053c1646f4ced149d762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412d56dda2cf6e3d71cb92c2f719b330
SHA1ebf5b169c3cae1552a4b2a6028749c07b19d9dd8
SHA256cce1482e99c69cd84466569da45cb56c56eaf05ca13fd50988d47deed4bdd789
SHA5122abfd90cffbb76b689510dd26d03b9ca4ae234f0212f5846ea2afb6c575fd2110701da1896f68d1ff189bdc54e9180fe49c5ba3e29898f1457244f4bc1b2e099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db2f80f68367f33371e7db75ccf9265
SHA17aabc483307255327c3425c461c210705a62ecf5
SHA2564998ff495c2fc8db4971d66fa41de7941cdf41e2dd02bac981d8ccfba103ccb2
SHA51210a8a6b88b8c8553c58b2b1fb36edc146a947f4314096306c610e013d6a143f96468c55254aee088cc82e27065542708b52e4f27e0a9aad6d4df4e8fbf7708f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8af73f3dbca4086462e5ba6605dbf2
SHA149b01e1acc8d8cc527bc9a63163b8cf6aca66b7e
SHA2563c07764999f3136d56d7aa9cf42435914cea4756a37b8c0f599e372155bc9a11
SHA51247f2279a3ad7827e39aa908dbe9d3dcd2016e622b99e33df7e5b207db2d3babad982707ea3e0b9c65813d60a0c758dfb05677f81ed4bb881f15bdc2a684089cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53149738445574bb1ea3be35e5a0af346
SHA1e1f513f3223212e2d4c40df0481303d578ea1e29
SHA256fbc4a9e60dd1917ae8f476a9f2501ebd6a7ffcdb0c2e63101d6f4b8b561a33a2
SHA51272e8dbfd623b41f789dcae2923424a33016779127b76c32d423ef826ed0d89bea27241ddb48d58761f60dce68e5d4be778e7b7d542918dae6510d1a7b35bf5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511d7632a33c224d2606cf07464e4ff48
SHA17c84558a644174893a09f94449ed5804ec928012
SHA256c4d8e3bfb6ae804122531ebcc025291e55cd021129bd5454d8321919030f76e5
SHA51229096810922a819975eae91c69dfa7b0c4a2593d13f2025568db99bfb9a4ca36bd9dbc12357c20a9e5b16acd719ef0036557fd6e5e46284d5f0795e96f1bc07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765ccccafdb7c27670918cbdb963ee92
SHA1d554c1e7cef3fbb2c742b3ba34d1201ef3ed4f55
SHA2560a6ad823003426dc7558643fbdbab60b7cf116cdafc49c03ba71b0d5041f073d
SHA5128c33fdd903eb289dc6a87e280d38558a7803c36012355d1b499bb95a1e948bf7d4b51c90ce5ae639e560f75c5a549bc192ec4d88ecffb43c068c41292790f747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f09d1e4aef79723687c6609fd0328c7
SHA1ae113560e133b6e49897ff48652ed462c252d73d
SHA256e9aa39694a9dc96b973adc8ddf52694023e39d30210f6364210d607a177a5036
SHA5129e580c84299b211c4a204bb0d206e639820407fb43f5415de8aa8633f273231eb082a51633efc29e8ec7aefe9c507071357e94859ac040560e5f9618651d34d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d58f91d77f41c826e320c796ad18b9
SHA1b6ba253442bb00ff95eb8bd30e9c217fd517ad6d
SHA256de40aa1c06be5051cf3ee24a8829e523bec88a2e28c1a684042c2690522fdd8a
SHA51237730084e6e255400d32a0bb6ec3f2f1360df3257613c1345eabca8a8a9af81a9318ca9112069d99627453bb98b34a64ac6c59d028af23afee422ef1426c7fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d3ee11ae2f87bae4da7d91963117eb
SHA197c428d38415f3a75cc305c74f123c6047fdaf4e
SHA25657a4fe8e7d7475a9188972177663b91f95d56b82a4164c7942853a723a0ba648
SHA5129629d6abf0ec98ccec46e58a18d5dc7aa1d8e17bfdd5d238492303ebdb4f09e69933119040abd419deb220a545b0ff4902abc7553fce84b3cc291b6c2f06cabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4592c0538bcd407dfa4b302836b9e2
SHA124cded541e6c2e6f244ff23a42f965fd852db968
SHA256e934bc238bbcecf5064f65c8b3e4bb5423ef0ff88924cb5673caac6b76462ac6
SHA51269823b1ba7097953d9b949effd61f0f1cf10054a128ff493611031372d33a8f9ee4aed288993b4cfba2399df8f508a5da6bacf06586a321de8c2ef4488771f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7800dc728ed86d00ac1e86744fd807
SHA12e19dd7f6e51ad73633f42725a08bc03f60862c3
SHA256e0590279d4353c598e849f3f8634928bfdbcb5409034e396b8bafe126bce9519
SHA512b06197d5373b9646331c798b7b903ed354a4774e27d13122062d50496d2206cdd3d605d746f0947d281bc0a1f5e45bf3d17a568b01421df1d13fd8b46337d2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50733c2710b1a56ca335267e04755a938
SHA1841c400c274a5c18e8be35e90ea0f10f2fe32748
SHA2563e9b9b006a86187497100e355e503352a396bde6bcf61360abaf54fe7e49beef
SHA5125fc39009daa8cc0b49d41c8cf42bdd717665d587e2348ac03a279c659543629f0d7ea96c5566edea3ac47adbb4b7572994baa4cc962fe11b676d56ac3fad7b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e83104d6bdcd8c33bb6a00f9947b209
SHA1a721e475b371cef7535dcbc139746da74485a65c
SHA2565b40cca563a39d1c988b76095ae8619dd1c73567f34138cb8a700e7ab5fe2a7f
SHA51263dc069b0574000479a37abaee2ed7b6b2c0570bd6193c0be21641b52e2ae5619b954c0fd3086fc6c01a697138220920dfd02a286d1e502e9668b821deebb15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d8ef7d74ebdf41a3a7b8b86228bafc
SHA1d9eca5833647dde0a28d994916f04c9e97e1adae
SHA2567def8e0ebd144b5b571fcea7a5eac84e39b60ee88c3f5edc5f541626334abb82
SHA5121c58779a58b2ccc25506efd6d5c794af4376209d1a6eecb14d846332578cd2bc7917a007b3398e1f2a1afabdbf7c4069f34dc2bca14e8226737a7c4de4a78506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd5329e9f8eef428618bb2efb50be41
SHA161f9021307cdeb231b1bf6ba9bad77c5acf6026e
SHA256ac27827519a5699a85956b8ef5e5466925f69543eb9cc1f681a6099ecce2ce75
SHA512b068991706f3010e4f502ab7aee21ba668e9debf3a92845797b0800015d7fd0c046514682f788cddf72c2aa09731ce260a8c6a81ea3aeee07bdc9df1fa262c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcdf49202de902afafd34959976a52e
SHA102a923e93134d464e8833fa46a1e8749d96ddac6
SHA256342ccdfd98d8a7a3ada1e33a8ee97507c8a910d76ee0626f88f094c88e19ccd0
SHA512cc6e868b95042f19765f14a1b6af26b7d83706a0f52d01a129c7c2a9e6a3d0a09dcbaf7d82ba786cc5e1e999f5d14b7541e1442b867551e52bdc7d27aac4a744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD529e71faaa41fa5cf82e84fff4e536feb
SHA1e3d87d56ebaa606fc10cc1879c75cbcb2ef81ab2
SHA256bd832c427bf0060253448df4dd97ead75e6d2b89f057299584992dc038303a78
SHA51202eb175e864fa996519760de631983db09044f9613d5288f80e668ef65c1b73f1e5c6236c396609604b744b14564e88ed1b1f22541ec58b44d2823c6193539b4
-
Filesize
24B
MD5b623140136560adaf3786e262c01676f
SHA17143c103e1d52c99eeaa3b11beb9f02d2c50ca3d
SHA256ee3e1212dbd47e058e30b119a92f853d3962558065fa3065ad5c1d47654c4140
SHA51268528a7eb0efd59bed8e77edbee80ec654ec3b8f58a82b1c8ce594dcd3aba07af28268aa83f161837f63ff4278068238aa294e0b5649a688db5a483314df6700
-
Filesize
24B
MD540208d46ccb89b1749c419e751697a83
SHA131a7984cd78857ea28c0b4d535490ec0b03c5b1a
SHA2568b02755694ee6cebcb756398c714467e70bef2f3ec300b1f5db0bdf3bf179ded
SHA512d7643090980ec02668f3bb5ae9f341178220d5e655078c55f7dc19598c6e4d75dc4eb5bc7d16ffa24aa191a31b5ac148843d22a454bdad6756cab7da677e624f
-
Filesize
24B
MD5ae08a2f7fbf44ad3cb6cbc529df8b1dd
SHA1bb2665ee5cd1821d48cca1cb07cdfde9ed6081a6
SHA2568429d5c6eb134eb64d8b0f3ecce83ab4d4d16e73c2d76993163372692b65ea8f
SHA5124ba54d565403b82b8c293acc2da5a4c6bbbe5278ea9449720b18901f58a68c3e91c494d763a3de4f3c295bad5685156552c2979453a8765e0b994c28f378f089
-
Filesize
24B
MD53e9c4eaba2c54dfe525197d54dc10532
SHA14b71d8970e657835ebceee5ec79faea2c1422fbe
SHA25605da3daa836dc6ed72144dff35f8d90396b4d524dc35ef8d8cd01d86855be858
SHA512d6c71d6d749ee3599216208ae7bb0dbb45153cec956c447756c826b06dee139df0903e18400cc73d143164a6e766e29ac7e6f6aed9b2f865b5bcf55caf2f5177
-
Filesize
3KB
MD5d19d2dbcf116a4cb9f5fedbcad9c9f33
SHA12984d9a292290213a7598863bf9619d0915a7079
SHA256723ffbee70bccf84084457b6c1374f9b484a6a7282f8b12fcb2805751ab0fe59
SHA512d70f594d1a94a80c11d166f705e302793b767644e7db9b4b7eb4351c41a863b62d3579caac6a1287bfedcb9cf8287d3d0fa1c5958985c32d1cf0dd533dc26388
-
Filesize
24B
MD52034995f0bbaa16db835b462eb78152a
SHA1ce19b1a236f95307067d4979f8dd96c70d69c18a
SHA25662ce260f5e10fc17bf63faafa39912febf61d20fad51cc11606a295801743799
SHA5123427f74d944eaaf5a3e1dd22dc566c718be58e4ceb53ba414c72bca974136cac2f1cd8d0a2a0377ce3918c3f83b2480fffbd9088be135fe0fe48c5a499fa6759
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
31KB
MD52ec7c43bdcdfbea9369c0187dcdb7776
SHA15ae0eb06dbe7f272d111e662694a3232837fcf99
SHA256a792eceb554d10d76f29071a6e202682a872a20a384b50428ab88cbbbae29103
SHA512a0c601effb48a3ee1c50ba2d1e478e9f9945f9c63cd68ded922b0876102e73a7dc1582aaeb1f62f3c9f5550d4cd5340e1dbb4322aa3129bb6e70186e933f79cd
-
Filesize
31KB
MD504979db956d28f674929fcb76cad8d00
SHA1ed063500babbb7e0661b0e1eed0de8b3b9f15ba3
SHA25612587ba985f95d58acd65039709a5820b1608b33866d023370afa9b46daed6e7
SHA512fb4421e5d5e39e2c8c097d04f9509b17e2db4118ebfe783e2664fc1ea1fcb2dc6236bb3040d7ca6e85b32919645aa1e47bb5585faed16edf8fb208c5f58b59d9
-
Filesize
1KB
MD5c9765b1c82ff2465ec8fd6508b97bc42
SHA16d27dba107aad6fee6d33b87c769e491d4e1c680
SHA256359fb3c511b6c27fd1b888c4bd72f53d80ec367a7a0b8397475930ca6e96a6c5
SHA51263500af5a86c47124bebe407623537bd67425bb3525e2cd481129b8f08f0a2fa95aff46893423e9820d2ddaad24a56f7e33a819a55820749db635626b14839ac
-
Filesize
51B
MD5317b90694697ae7102ddd3e478697427
SHA1cab27862e7d96bf5ff730f11aa87e4ee339e2695
SHA256f0f8aecb3fcf1a8e209fdb0e6b4d3e8b64fcd00c3c74a1e9d3ac8eaa83ce9083
SHA512e1b2841fd21b96201a0426ae7335b046ee5b2a9976ab1397b0eee0d983281e4cf93bffdca79320d0b1e8fc1d26be1ddbb9d0002021e93e5e9abc7c3ddca00fd7
-
Filesize
57B
MD5dcaee34a2c60147f888044df74233596
SHA1ce1871c507daa5a21e6cc76a523ebff1eb488c8e
SHA25658f7d9781f4329ffd086ef41567100491f097131850d07227fc52f8090628593
SHA5127401783e2a434330d988b371d301c6b955ef84828c3701493f175745e984e411d0bbc5de9701071af26c4a87777fa69e81d5a2388a7f36036b638af6d55c4b90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite.sVn
Filesize48KB
MD5e1c16e0948bec97dbfe69108d944b355
SHA1211ebcf6b3804c33936473fbfec8dd0fac074429
SHA2567356d6ba1e842c9a5037b3de546f7b86777b0e0d6698047aeeb27633e4045121
SHA5120305dc820c9b79b522c373647b8737770dd786fbe8a9f8f125fa5780d224254bd9ea4e5552752e110f35a1adc80852a1cc01cf653972bd5b2b6da49a14b5b741
-
Filesize
270KB
MD5d871366edeebd2bb78560ca5709c8737
SHA1071f3791bb9d93f6626456894c6d99c5ca790e21
SHA25688143ad3f449aaa8162b4d29d9eb846453d86bf28c79549fef157611bb76facc
SHA512f4b38977ce4f8cd9443262cada150b2c9e398767fc697636917d8065bfe4045fa101430435d0a08ed7eea17baea96cd20e612c65b308ca130775a520910d727a
-
C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Agent.pef-6094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e.exe
Filesize234KB
MD5c388cea820926cb0cb78ec7ff2ea837e
SHA1b2f6c5112739dd6c3d4f87ca9d8d94c7db3ed8f0
SHA2566094054467a775e9f9e5392b479b41ce9093c4b9fa7fc374ed7517496825d87e
SHA512f2276d09aee661346a8e0eeaeeab58ff07d0d1dec529eb91df8954b1296b568bbcbad7f0bcc46f5b0feae8efa13d5ec3f3ba56eae5810477beed24648f01f730
-
C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.pef-2debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b.exe
Filesize284KB
MD575f0808760bfd840b1bf0c0f346c254f
SHA1b417a5578d708155429ac741b6a71ae558d60041
SHA2562debd47f853fd25ad7c286e19266d6e0d711d1d41b47b53978c18557e291251b
SHA512eafde297aec772a94e0ae833b5de25e6497bef2c508b63d0be822fd68c8d7296ea0fb64e8bb7f6d63e310ea8ecf8e2ee82c6e7baeb26851978b62f3d8c8aa801
-
C:\Users\Admin\Desktop\00292\HEUR-Trojan-Ransom.Win32.Zerber.vho-13b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac.exe
Filesize257KB
MD5d92f77c319e62e28febd92607bb3d92d
SHA1a306234bab0d0bcbe798a0fd4d1c829224f1a9ed
SHA25613b17fb9ff6962f04ff6a5fc713c1e0b5b3a3d338f7d22552e45e0482d753eac
SHA5126135a66b4beee0596d2b6512a82b830d8bdcd7dd1d64d701c9193f15a0d0b1c7e8384e192b7e994b717437bc7162f26942861826b93397afb1186d15050f18d0
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.NSIS.Onion.aftx-1cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b.exe
Filesize280KB
MD502cd7d4617673631f46e9763f62cd462
SHA10774d7a2116f4b2a0974500849af6697e1d9f142
SHA2561cb95c9c83dff87079965d5cea6fb6a55ab82abca140de6adcff1772db60099b
SHA512aa3f9fb2c2a951d8a0ea07f986ae6249563d15f7c6abc2f0e1b57f104d3dd9ec0fc9b07349004e6baab7404c518dce7305dccd0ab191547554749933ca791fea
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Agent.iza-c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3.exe
Filesize546KB
MD53fae0c593de7d8a407e8ffcaafdd52d9
SHA178820cd3a877d15f96a2eb8485b78c4bf9f989b2
SHA256c79505295048052ef032dc6db843e173451787b275b5dc89d256d8057fa77bd3
SHA512f315332167c8dd2da9da4fca6202ee7d9d83de0ef817332b175a3dbac137c23389cf0af1a2e0ce4c8067ddfdd4d5fe426f0a23a438c7952cfc406d7110d89052
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.jiv-e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e.exe
Filesize376KB
MD58a6bd20006a7b2e38001d82cfe3b0e24
SHA11f96ac722a2479efb8a38bdc99ac0e4d6cde740d
SHA256e388c6d6db6e8cc160a867ebd8c163933745d08847794e382b2d48469a59529e
SHA51271787641272428dea13c225d37220f26123376d1e4fa193da6adec9c7fc92a7bdee9c61b6546f4d3c0aaec4e0ad0bd92f38a7e3ee40901b54cde7df7ecc7cdd6
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.kba-1b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47.exe
Filesize372KB
MD5226368e6a217253de966c97d7657adf3
SHA103524721575ae7bbf58cf93849835e38a9ba3c3b
SHA2561b25c660f2dbb2be0ba596bb2697f486b92a961bba24226aeb82d8f0ac2f8d47
SHA51224d65267eb08d234b5df94c3fcc0701f3fecfb945f675279113c22e6e32f538d5006bd5f87020aa6992e8b2bfc679f3a744b0e6d0c206cc0ad5011c5888a0913
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Bitman.nhp-f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c.exe
Filesize425KB
MD509fbbf57249db6d997eec58ca1c81bb1
SHA1ba0a980f079d84a6314c060995844455832f16d0
SHA256f7ae8cdf7d73a5630b8afec2f4502b1ed163bb620bb960bc6b26a057ce73fe7c
SHA51281b5afdb2ab680f67f5f1718984d1f10ee21e1194ade2175af1a8b0f4d8c601b5c6d278efbcd19f140a2613335d46b3475b987875b16a47e4730c1f42c8452c9
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jzph-02c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6.exe
Filesize1.7MB
MD537bf7e84a2581440e51c23a0c16eed6d
SHA17d624a0f5303d4ab2ef2b70707dc31e2dda21ec3
SHA25602c5d808e6a0aa19b09cbf1ab759f79bafc55e6127872d581b1d85686e1015a6
SHA512ac8e3e9166fefd667321f951c84e28b4bb04eab02daa51244289e3d4e69fd7390bad5189aad376b1915fe450802ed4026e72d0918e9cab5f6ed0275f94cc2e6c
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Blocker.jztu-e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f.exe
Filesize390KB
MD5b3e7fe7896dcef7b810d33870fa5a98d
SHA1c544c88de43d1bdc1c84b9388c17a001b26aa9b7
SHA256e2783463e8f7cb96909e10704b9267e283213a457a3ad248e239e3b3de4ebe0f
SHA512d7bad6d534731670255d471251c0ea81d1c0103ad7fa8ccbec2bd4d62ca61b047acb2a05935801a2263e1b4c64e4b901414c0c7afa54f9e6b4703137c85980c9
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Jaff.az-dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d.exe
Filesize82KB
MD5d349764bd5e16ee0e202b1e9dc057318
SHA12c6861b942341e193b633cf01755ad6660e117e0
SHA256dd6e62e4c82170b42b515e4c25cba3c2cc95b44c032c844208de77172cac084d
SHA512d1c46c00f51f537680dceec8b7fe596f5a5633065cabe06e5204d5c8632288bdc2fa62536105925f01125805c77a44d46730834eab3f7a080cff31e6eafbce27
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.akz-2fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7.exe
Filesize253KB
MD56c33700b12efaae1d87191068e2d9936
SHA10555391ac7dc88601d8642150a752db042d21b24
SHA2562fcd597cef85c840072220a4742941c57cb1b19aee71107828faafa06d2f57b7
SHA512381e493a5cde885d90e9c97488c0ff7a2a3cd564a0217643a0ee3e01ea397aadc8d6bdf49e81f2197ea3b7b7cdf24df0551e94a8a131b2c999c18d55039b36cc
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.bil-90f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e.exe
Filesize244KB
MD5b55da351f741d4a1b4ca78ea7e24bd28
SHA159a47ac1e30432b1acee820ad7e7236e9f3bab0a
SHA25690f1e63fb40eebaca98ae542ad1a3cf59d6a2e13fd192173c401ec686869001e
SHA512604039d1a01cf6eb3e24d2f7362dd4bcc91a662dc548be8a1c310d1a741f40bad9ed08a7ad0b43fdc1260a5617c4fcb8a492cc8d7db2113bd2ec23034655feb5
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.so-4befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e.exe
Filesize221KB
MD58da4cdc3e2ee16021f237ea7a043da8e
SHA11106b06137a826e0987836e1f9e251006cb9a4a0
SHA2564befc9eaf008ae1890333ef8fc085bdc18e49d6b34d0432fb59cb7ecd497015e
SHA51276a9efce55fed3e524e2cf4d7971eaac50cdfdff014f688d1a3c74f4f25e8b527ea2d9ae5460d52fb98a1ac26340ac9b498c3c57c42f65f4b1afd9f5bcdf2f12
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Locky.uu-70ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa.exe
Filesize133KB
MD5f307579cb7b724a796ea7e7507e632d2
SHA1e2ce8d0d21d79a366c0f4ac7620ee39e8a8ae0c1
SHA25670ce1dc601c9d621f8292955ccdc5b3600d3a1b1ebd7335e37ea0f57f7d3e7aa
SHA51219e3bc0aa77e098ca482da05f8193e3f2e60eda13ac44401e537c8d4e7ed53b8aef437ee8e75ed172660ca58713a6ce2e462834c423ecef09a0050daa2339c63
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Scatter.ja-0d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36.exe
Filesize186KB
MD5e9f18559b915158f3fe449b1ed8a6f98
SHA1c8ed7e75f8cce9d6ff6f2f871f74634b2e713072
SHA2560d93ae259776e8fec19bb37dcbdb3e7666c1e3b460137241f3f9e7e73267ea36
SHA512025e0f1d4c83cb29b53463cb2b04a626d18f8b6cea895de2590ac3b630fdd9e3db11350e6e4dbd7282b29e271a3bafc7dead0692e1640f00bbbe8fde7c16917a
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eaok-ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb.exe
Filesize540KB
MD517acfc6e57ec12dd1df509ab10ec29da
SHA1ca8c4bfd81b7c72510c924fd95f530e280bb25b9
SHA256ed7b8675080db9821dcb531824e70c7ec4fbec965810a04fa2b3511c3c1726fb
SHA5123f9ffb2e9a619827a2bce24f495ac7912428fe39301d56b1ba8814745aac774a7bb2f486e3ea793dc79268b62b5115902d6d4e985d07482fe77b80fdf949c5fa
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeet-de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f.exe
Filesize256KB
MD5ad6bb84b14fb496b49ccb4769fd81684
SHA1c436af870d16c244ada7061aeda99414b0d5b4a4
SHA256de3e697abf272172c5ebcbaeb500c6944d307693f3755250c0bb953a36961a0f
SHA512e0696c6819d469391ddbe5e38d651a35ef190df282057b1b60d8e9b0d6c4966cee97de1ad60db4df5fcfcd9a4a1cca7781fceddcde4532479715f05da534537d
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.eeki-468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2.exe
Filesize306KB
MD5953564a8047a2002ff53244ef68f286d
SHA1599f6d40e5acaebea02ea53a04d85a13a7ddf940
SHA256468f076437db73e8b6e07784029e76067a408b262913a9b3258756dbbc2125f2
SHA512bf1fc622b95014e05c6fe630874d7f937dde07281147b57c307dd820a782a2fdfa42f63e97834cd94d0406b11257d79f233b58e84df0a1a684c884b0156a9f2f
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.erie-6cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232.exe
Filesize342KB
MD594a3bccf14fa5a602c61f80ec6b47963
SHA14b6f442c1c9b453dac1668fecaacdb992664cffa
SHA2566cfd956f242e0a146747752474690ca1c94a9b8992648e19bb53f383a80aa232
SHA51208f1ddf05771a01828e5140c5e0daf9189559a38f26671a147024a629790755f38ab8180810e632d101db846131dee294f875db3568ec496f9e65bc5856b74bb
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.fpkd-655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e.exe
Filesize496KB
MD5b58c0e7522fe5b27c067c406b563b8b4
SHA1c3baa0c077300e3073d6f5ca34706ee2b88ed7d2
SHA256655b716315904da7ff7851ec2bc5a46da4fef21ff331c114fd6bba4d36d8806e
SHA51227ae489a202da4d4a60f438ae8f0bfb7b6d94fe2b7968b0e15a20e9795fef623a86a50fee18f7e777b0a92b739b1e70dd61635d8780fcc49a481c04207f581a4
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.gdgs-fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46.exe
Filesize284KB
MD543e23845e7a4646bf6cbb592ddbb43dc
SHA1d16528be86a8e82955d21db32ddc665333282cac
SHA256fdacc6ae4f40f495f5819ff556eb8635a200f07bf76d2048dcf8cc5719e74e46
SHA5124f28e46b483f713c4396bc48afbfd6d209efd7d7b933ba6aecfcfa73e549e1d17448ecac3f6540d3df8495af1751f6deceb89eb8f38f9d4a4a5c0114ade3b9ee
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.tmu-81cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef.exe
Filesize287KB
MD5b407825b6f7cf039a583e633e21c3849
SHA1260ea2c5a3ff1e93e42fd95806b5b0bc378ec2e4
SHA25681cc48cdd4ed8a6f52860e33cd8835a189c90a3c1697770a4e117db53b4970ef
SHA51260ef4efe9072fdebfbb4e46fca688902c1284e6e3c6b3d39d29029710bceb3ffe6123bc20b1f8d11cb7c9aa6877a96f8ea9c228d9888f1fc4caf3b40b9d0df75
-
C:\Users\Admin\Desktop\00292\Trojan-Ransom.Win32.Zerber.una-a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9.exe
Filesize261KB
MD5e552907368298cc71a4213911821066f
SHA1f62e8c07f230fd4f4ae58618946d42ff319bbba3
SHA256a0a2d8686cf32cabbf8ffbdf6632c2d0c1fefba8c82fe730d2cffdc4db2154b9
SHA5127b998084669175e76a993e79ac29f529db6de379548c82415ecc4c580e3b69dd7eb0a093c3602b612fbb4c705abf2f0fcdef32ce4f2285c070adba33e1298cc7
-
Filesize
281B
MD5f8092c6669cc326349bb22cdac55509b
SHA16f5638d888789c69b9450c5d1decdd9b3a12ba08
SHA2564eeb557ebaab62f1e3d2c59c0e0113a676bfbdac627d48fc3118d8acfe7088e5
SHA5120babf301991e90b0aa7a9022f0bf3c12f66b13c552a1f820c49b2fbc0b1f87bcbe88bf44200a9d7ba930114d9f97873df9b1c2e39ca347e1427e61b7f7af7bd6
-
Filesize
457B
MD5d16cde742042e6dd1afd34b6dfe95739
SHA1a5bcf4e8f51d0c050009cfc0fc1f92500f8b6083
SHA256ad8cec1b8c6753e0b9eeb2d49b98875f9a2c82de68a3f725952486fde1ab6c94
SHA512e968f326bb6b4c2afd601dac335a890f25fd3071fd91dbf437ab4422c5a89b56a20877cc7e2e53c30c3a4771accaac90ea0b5a2bcbb74a3bd7e138f23e2c77c0
-
Filesize
489B
MD5e085b872d49eddaaec12b8ea38ca7ee0
SHA1c82a46eb5c3f71196c8f4c1f5e097843177568a7
SHA256ffdc77b1cafe493cfdf862947bfb3bc0f67c122ca76145bdefa52d0657204a9c
SHA512657bcff07d86eb97a81f64c1d513936f51f8de8cb8ed7220c23d0ba9f083b812d20816d057abef7f27605b7ecc9f0b54fb24092dafaf3a1296c17f2555d660a1
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_leftCorner.gif.sVn
Filesize345B
MD545514df2672acf4549e41d68f923b501
SHA124dd719b833bb21b0c95a299f675a417c1f2e473
SHA2568641274fbf37940a30373d13e8ceb843a08aca1895829cc9e2cd8a567cf882a1
SHA51252d13f0f60707d73855c2334ab8f4fe02f7605e537bf06f6fa6e9d27d1a91d87db38bacd104f026c450ced8eb181c330f23770ce8b4bc404c7bf4d3888ecaa99
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\selectedTab_rightCorner.gif.sVn
Filesize345B
MD5805cf7befebe682fb728a572d55709f3
SHA1f2c4ad8f2b921bd18272a431ac2f9671ba94a0fc
SHA256f96c2db0edb1cf664abe67b9a1c041f7336de23599e1979e7585800a9831bbda
SHA512ff28161c248cc04a99dc4db3f6870dec26d7a8351762096b6f91a504abdb26dab89012b9e14355dc54008e8920d634c3aeea2a25d4865b960dc55508819b9c4e
-
Filesize
441B
MD5fa63021f234a4dec32fb1b50a87dee63
SHA182e6f67a2ec3faefac87d0b02cfcabb3db59ea7a
SHA256c1cee376ded86f64f35aeed9345fe8666ccdc0cbbbda675a433e9e54c0466514
SHA512c95795ede3bb41c11d747a693d9fb66672c726b07cf6f1b752525ee3f787e5fca1e7225099eeac66217ebaeaa6c39ce914850eedf7db567b2a3bd4cb456384f2
-
Filesize
553B
MD5de186202cbe3e6becc2466761c668dee
SHA155d31eb68c846319380135fec5d8244ca270f03c
SHA25629b9e3923924d32e89dd09f41182fc00d4679023afcd13f464a9f355cfdd7b81
SHA512a848bd87bdae4d5e0369f42046d74119e877bfb32bc691fbfb438f6c024226af6fc837aa74188f6eff75f2c520d7f974e9a1030212df12d5aae71b25cf6d8bb6
-
Filesize
2KB
MD57b46528b61e3efda1385d447723acc64
SHA134a0c22e1fecdd75144cc57271c05ce9bc468ded
SHA256f891a5af25e43737a6ab06ea9e23f501789cb7f58a81623ac88b6f019ba46570
SHA5124959f374771e0bb24a5372c50581100312385dd5f9871cc678c8d791b278ddda54cc0763497405ed628db0e049a72d0a97ea6323d3d5fd83c955a94fc3c1337d
-
Filesize
13KB
MD5820f2d05d32b5cb6b3079338632ee6ed
SHA1a5b418b0765c03e16fded1c99753f424dd1594a3
SHA2562751acd7e987943ae34f5d582857f503a4cc0d88dcf9a967a7fba83ed22f592b
SHA512c9d5b51d1dc8eda41e2e270d679cd7d077c30b70654d10b9484a88b679753f62d3f5d1eb1bc4b7c0c7b58ee1edc702c3c5a52647fcbebba27c0de222212c7249
-
Filesize
329B
MD59759cd6ec262159b22e6e1e21c151cb1
SHA1692ef3630a9d01e3086ac8561b95ebbc7b4752e7
SHA2562aee3303c339dbcc9aa1b5b1709632e1366efb8aea76008cba214cd2cae8dce9
SHA512f467e3f9f612df364f987c69c3f9313c589bdddde16bc377157fc8b8e0b27bfd85c1dc8745570c735406be844cd43cc81adefce88f240c617f830cf024b16592
-
Filesize
425B
MD51377bff14eb8e4a1c23d40cb184a8108
SHA1fc95f59ea27c1b3bb0a138c1cc371dcc5aa25b39
SHA25655119a64af8ace7a4250cfd9d980ee330c4ba663e69c6fa9e91154108935507f
SHA5129873d589161d4702fb418a500d7d264950debe99dfee509e5936ea2f3db3028443e642b1fd84e8c6469b93811476d8240ef23a4b239b2a0f8353197e7d581dae
-
Filesize
457B
MD595c9894ff2e9fe46fae08de70fe45f30
SHA17fd59c1f3a1d292cf006a87942269f4e2a03db9d
SHA256c10ee36e7d2096841ff0d08c6ee32401ce4b182b94390caadd688cf38b35e6fa
SHA512af4641116428bf750a3c7b8bfe15ffd55d473f333ce79f62936e3e1f07bd620638d54e0f561dc0fc74c5b4f4d01037e3f682257d2eb57c6542f32760bb7767c1
-
Filesize
3.5MB
MD5c0853654ecfb702ba39496a93a05d48d
SHA13d0ff9b37a0874908b679da6e1686a6b8f0ab8e4
SHA2561180ed1d20b5150e051965470e7ed1c0625231587980da9b758ec0102038e9e7
SHA512fbb3fa6419ba19b39937494bf72327680d79e50a649161c96da4cdc032f4b62941d330fc07aa814047827526f6f244c6f523ab5532efa63c63971f749bbd94cd
-
Filesize
1KB
MD571a69fc2cd671e929c63eb7548b75523
SHA1d3cd0ca7759f1d08f8a86c2f02f4254810d9d99c
SHA256a92b2dcf7644b08b4f418e4150a8ceb635aefebc84e9073c015a864369673f88
SHA51201c95cfedb5244115e35e60a7c32b59d0ebb3b1d9b9b7544104748bab98916f06e0ae10900984250e7439da3f1e7545d91a7e323a4f9784b8b713e98ee13bbf3
-
Filesize
31KB
MD5f51df0fb81edd044237e15cb8cf9f737
SHA1d1afed748fb0921d547558f97b1b23e11490c96e
SHA256c67226eda3b2f4229e2bcb61de9eb9e704c721340fcdc15acef5e86ca1dfbd2b
SHA512543291c0a71e73f5434b0940f74421dd8a1deabe92c19f6ff6c53e4ef60ab936f4a4410539fd77841dc50357351fabdb0b4b5319a71eebd4ec9b40a55f2f403a
-
Filesize
1KB
MD5fd6c1a9cac8803621d9f4b47474be096
SHA168ab12660f4de370c4979fdac8470dbb82e06627
SHA25679c336a9548b239e7588e3a37dd8e0d743c96ba77b531d06a8727bbb91060483
SHA51244e9ce17fcc95d813de03ca3f10e5cb3b9eb9c87d10d9f434d8fee9d04c4ca10e16cc54ac7677edc1d1bcb4635975f9d6d24dc59eca6ae1b7c7c7a97774c5b4f
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00