Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00280.7z
Resource
win7-20241023-en
General
-
Target
RNSM00280.7z
-
Size
4.7MB
-
MD5
b48f8458bdb951ccda3b160b14b66f58
-
SHA1
06fa206e5f66f2690fb7752b34bf5201549ff509
-
SHA256
1ec18abdb330ff2eb70bf897b7363e5c68505f9fa3fbc151d21aff89736874fa
-
SHA512
7c103b393a5aeff71d41b5203faa4c6f83f89f39d1da97782c0a3b3cd40cb77d7ffce5cf8f88f2120e3c7194714398f0a5688ab3c21a68f314d036f65294127a
-
SSDEEP
98304:coRmKVszuiggNjp+D3RAfkb5N1JZubwTHZH/8NXpe7udFjts3c:lRnaz4qMREkb5N1JA8DlZ6dFjtP
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_htjqw.html
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_htjqw.txt
https://zpr5huq4bgmutfnf.onion.to/446AEB6A2AC36782
http://zpr5huq4bgmutfnf.onion/446AEB6A2AC36782
http://kosdfnure75.op1gifsd05mllk.com/446AEB6A2AC36782
Extracted
C:\Users\Admin\Desktop\_HELP_HELP_HELP_2Q4P_.hta
cerber
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+cqfpn.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/26985A21B99E3A
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/26985A21B99E3A
http://yyre45dbvn2nhbefbmh.begumvelic.at/26985A21B99E3A
http://xlowfznrg4wf7dli.ONION/26985A21B99E3A
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Cybergate family
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Locky family
-
Locky_osiris family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\cache.dat" svchost.exe -
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe -
Renames multiple (305) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (976) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\Micrsoft.Net\\WindowsUpdater.exe" Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\Micrsoft.Net\\WindowsUpdater.exe" Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 2228 2604 mshta.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6247D3T6-N1H2-K1X0-5QOF-CX57I58B6FC7} Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6247D3T6-N1H2-K1X0-5QOF-CX57I58B6FC7}\StubPath = "C:\\Program Files (x86)\\Micrsoft.Net\\WindowsUpdater.exe Restart" Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe -
Contacts a large (1127) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks for VMWare Tools registry key 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sys_Updater_2017ate.exe Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sys_Updater_2017ate.exe Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe -
Executes dropped EXE 38 IoCs
pid Process 2476 HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe 1512 Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe 1380 Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe 2860 Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe 2428 HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe 1940 Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2804 Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 2608 Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe 1216 Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe 2516 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 268 Trojan-Ransom.Win32.Locky.bil-73536ed3a05e8c229892a66694ced4dabff9099eecdcb6a85cf6c5d0da17d2df.exe 2356 Trojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exe 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe 2076 Trojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exe 2056 Trojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exe 1920 Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe 2288 Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe 1784 Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe 1712 svcegd.exe 676 abgrcnq.exe 300 svcegd.exe 1988 Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe 2324 HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe 1320 Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe 320 trojan-ransom.win32.blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2784 Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe 2344 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 3004 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 2160 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 3284 WindowsUpdater.exe 1472 Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe 2920 WindowsUpdater.exe 3852 vejcqoxtpwwi.exe 3904 WindowsUpdater.exe 4320 Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe 2980 vejcqoxtpwwi.exe -
Loads dropped DLL 23 IoCs
pid Process 2608 Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe 2476 HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe 1784 Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe 1784 Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 2160 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 3284 WindowsUpdater.exe 3284 WindowsUpdater.exe 3284 WindowsUpdater.exe 1940 WerFault.exe 2428 HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe 3284 WindowsUpdater.exe 2920 WindowsUpdater.exe 2920 WindowsUpdater.exe 2920 WindowsUpdater.exe 2920 WindowsUpdater.exe 3904 WindowsUpdater.exe 3904 WindowsUpdater.exe 3904 WindowsUpdater.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 14 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 128.199.248.105 Destination IP 178.63.145.236 Destination IP 185.14.29.140 Destination IP 83.96.168.183 Destination IP 178.17.170.133 Destination IP 128.199.248.105 Destination IP 95.85.9.86 Destination IP 95.85.9.86 Destination IP 185.14.29.140 Destination IP 37.187.0.40 Destination IP 108.61.40.140 Destination IP 37.187.0.40 Destination IP 178.63.145.236 Destination IP 178.17.170.133 -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\Micrsoft.Net\\WindowsUpdater.exe" Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\riwmbfbytmwn = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\vejcqoxtpwwi.exe\"" vejcqoxtpwwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\446AEB6A2AC36782 = "C:\\Users\\Admin\\AppData\\Roaming\\svcegd.exe" svcegd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\446AEB6A2AC36782 = "C:\\Users\\Admin\\AppData\\Roaming\\svcegd.exe" svcegd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\trojan-ransom.win32.blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe = "C:\\Users\\Admin\\Desktop\\00280\\trojan-ransom.win32.blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe" Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\Micrsoft.Net\\WindowsUpdater.exe" Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1095 ipinfo.io -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpBA98.bmp" HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2804 Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe 4072 svchost.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 1940 set thread context of 1784 1940 Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe 55 PID 1712 set thread context of 300 1712 svcegd.exe 58 PID 2288 set thread context of 1988 2288 Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe 61 PID 2476 set thread context of 2324 2476 HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe 63 PID 2608 set thread context of 1320 2608 Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe 66 PID 2864 set thread context of 320 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 70 PID 1920 set thread context of 2784 1920 Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe 72 PID 2516 set thread context of 2344 2516 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 73 PID 2344 set thread context of 3004 2344 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 74 PID 1512 set thread context of 1472 1512 Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe 81 PID 3284 set thread context of 2920 3284 WindowsUpdater.exe 82 PID 2920 set thread context of 3904 2920 WindowsUpdater.exe 85 PID 2860 set thread context of 4320 2860 Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe 103 PID 3852 set thread context of 2980 3852 vejcqoxtpwwi.exe 108 -
resource yara_rule behavioral1/memory/2324-217-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2344-345-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral1/memory/2344-360-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral1/memory/2324-357-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2920-1559-0x0000000000400000-0x000000000053A000-memory.dmp upx behavioral1/memory/2920-1815-0x0000000000400000-0x000000000053A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\_RECoVERY_+cqfpn.html vejcqoxtpwwi.exe File opened for modification C:\Program Files\Microsoft Games\More Games\it-IT\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_RECoVERY_+cqfpn.html vejcqoxtpwwi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rssBackBlue_Undocked.png svcegd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_RECoVERY_+cqfpn.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\13.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am_ET\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_cloudy.png svcegd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_RECoVERY_+cqfpn.html vejcqoxtpwwi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png svcegd.exe File opened for modification C:\Program Files\UnblockExpand.rar svcegd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\42.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\Windows Defender\en-US\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Media Player\en-US\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_SelectionSubpicture.png svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Media Player\Skins\_RECoVERY_+cqfpn.html vejcqoxtpwwi.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\settings.js svcegd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_RECoVERY_+cqfpn.html vejcqoxtpwwi.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_over.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv vejcqoxtpwwi.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\_RECoVERY_+cqfpn.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_foggy.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\uk.pak svcegd.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG.wmv vejcqoxtpwwi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-previous-static.png svcegd.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_RECoVERY_+cqfpn.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\restore_files_htjqw.html svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\restore_files_htjqw.txt svcegd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\restore_files_htjqw.txt vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.png vejcqoxtpwwi.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\weather.css vejcqoxtpwwi.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask_PAL.wmv svcegd.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\corner.png svcegd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi vejcqoxtpwwi.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\ HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File created C:\Windows\vejcqoxtpwwi.exe Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification C:\Windows\vejcqoxtpwwi.exe Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1940 2784 WerFault.exe 72 -
System Location Discovery: System Language Discovery 1 TTPs 50 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcegd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abgrcnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vejcqoxtpwwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcegd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vejcqoxtpwwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trojan-ransom.win32.blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2032 cmd.exe 980 PING.EXE -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2524 vssadmin.exe 4776 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 4628 taskkill.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallpaperStyle = "0" Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\TileWallpaper = "0" Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000003ed176fe9a84cafd71e1f900660c0d2cf160f03365162643e75e556befceb0bf000000000e8000000002000020000000521223e1f01a3a837dc622b2c88908c26eda371b0a31af0d6cf0224f22b6b06620000000d7601230abaf8dfb74751eae581774b1bd312b9fd531848c79e55477f1686de1400000001e3fbfb5f7deb53d7e433e9cc3cf77def2ca4b9b170d5b9cc822be1cf89cea8b93cdebc3d8f3be121866b3aa7063ea3b643763cef04592ffccfd0f7c8d676368 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50943002673bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BBFD691-A75A-11EF-9841-C6E03328980A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\msys svcegd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Apparition Trojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\Trojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exe Trojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\pdf Trojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4748 NOTEPAD.EXE 4800 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 980 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 19 IoCs
pid Process 2476 HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe 2428 HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe 1512 Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe 1940 Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe 1380 Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2860 Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe 2804 Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe 2516 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 268 Trojan-Ransom.Win32.Locky.bil-73536ed3a05e8c229892a66694ced4dabff9099eecdcb6a85cf6c5d0da17d2df.exe 2608 Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe 1216 Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe 2076 Trojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exe 2356 Trojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exe 2056 Trojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exe 2288 Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe 1920 Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2952 taskmgr.exe 2952 taskmgr.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 2952 taskmgr.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 1632 Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe 2952 taskmgr.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe 2952 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2160 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2476 HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe 2608 Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe 2804 Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe 2804 Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2324 7zFM.exe Token: 35 2324 7zFM.exe Token: SeSecurityPrivilege 2324 7zFM.exe Token: SeDebugPrivilege 2952 taskmgr.exe Token: SeDebugPrivilege 2864 Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe Token: SeShutdownPrivilege 2428 HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe Token: SeDebugPrivilege 1784 Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe Token: SeDebugPrivilege 300 svcegd.exe Token: SeDebugPrivilege 676 abgrcnq.exe Token: SeDebugPrivilege 320 trojan-ransom.win32.blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe Token: SeShutdownPrivilege 2824 Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2324 7zFM.exe 2324 7zFM.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2356 Trojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 3592 DllHost.exe 3592 DllHost.exe 3592 DllHost.exe 3592 DllHost.exe 3592 DllHost.exe 4848 iexplore.exe 3592 DllHost.exe 2896 taskmgr.exe 2896 taskmgr.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2356 Trojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2952 taskmgr.exe 2896 taskmgr.exe 2896 taskmgr.exe 2896 taskmgr.exe 2896 taskmgr.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 1920 Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe 2288 Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe 1380 Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe 1380 Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe 2288 Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe 2344 Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe 2920 WindowsUpdater.exe 832 iexplore.exe 832 iexplore.exe 4848 iexplore.exe 4848 iexplore.exe 5016 IEXPLORE.EXE 5016 IEXPLORE.EXE 5016 IEXPLORE.EXE 5016 IEXPLORE.EXE 4232 IEXPLORE.EXE 4232 IEXPLORE.EXE 4848 iexplore.exe 5016 IEXPLORE.EXE 5016 IEXPLORE.EXE 5016 IEXPLORE.EXE 5016 IEXPLORE.EXE 4848 iexplore.exe 5016 IEXPLORE.EXE 5016 IEXPLORE.EXE 4848 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2476 2668 cmd.exe 36 PID 2668 wrote to memory of 2476 2668 cmd.exe 36 PID 2668 wrote to memory of 2476 2668 cmd.exe 36 PID 2668 wrote to memory of 2476 2668 cmd.exe 36 PID 2668 wrote to memory of 2428 2668 cmd.exe 37 PID 2668 wrote to memory of 2428 2668 cmd.exe 37 PID 2668 wrote to memory of 2428 2668 cmd.exe 37 PID 2668 wrote to memory of 2428 2668 cmd.exe 37 PID 2668 wrote to memory of 1512 2668 cmd.exe 38 PID 2668 wrote to memory of 1512 2668 cmd.exe 38 PID 2668 wrote to memory of 1512 2668 cmd.exe 38 PID 2668 wrote to memory of 1512 2668 cmd.exe 38 PID 2668 wrote to memory of 1940 2668 cmd.exe 76 PID 2668 wrote to memory of 1940 2668 cmd.exe 76 PID 2668 wrote to memory of 1940 2668 cmd.exe 76 PID 2668 wrote to memory of 1940 2668 cmd.exe 76 PID 2668 wrote to memory of 1380 2668 cmd.exe 40 PID 2668 wrote to memory of 1380 2668 cmd.exe 40 PID 2668 wrote to memory of 1380 2668 cmd.exe 40 PID 2668 wrote to memory of 1380 2668 cmd.exe 40 PID 2668 wrote to memory of 2864 2668 cmd.exe 41 PID 2668 wrote to memory of 2864 2668 cmd.exe 41 PID 2668 wrote to memory of 2864 2668 cmd.exe 41 PID 2668 wrote to memory of 2864 2668 cmd.exe 41 PID 2668 wrote to memory of 2860 2668 cmd.exe 42 PID 2668 wrote to memory of 2860 2668 cmd.exe 42 PID 2668 wrote to memory of 2860 2668 cmd.exe 42 PID 2668 wrote to memory of 2860 2668 cmd.exe 42 PID 2668 wrote to memory of 2804 2668 cmd.exe 43 PID 2668 wrote to memory of 2804 2668 cmd.exe 43 PID 2668 wrote to memory of 2804 2668 cmd.exe 43 PID 2668 wrote to memory of 2804 2668 cmd.exe 43 PID 2668 wrote to memory of 2516 2668 cmd.exe 44 PID 2668 wrote to memory of 2516 2668 cmd.exe 44 PID 2668 wrote to memory of 2516 2668 cmd.exe 44 PID 2668 wrote to memory of 2516 2668 cmd.exe 44 PID 2668 wrote to memory of 1632 2668 cmd.exe 45 PID 2668 wrote to memory of 1632 2668 cmd.exe 45 PID 2668 wrote to memory of 1632 2668 cmd.exe 45 PID 2668 wrote to memory of 1632 2668 cmd.exe 45 PID 2668 wrote to memory of 268 2668 cmd.exe 46 PID 2668 wrote to memory of 268 2668 cmd.exe 46 PID 2668 wrote to memory of 268 2668 cmd.exe 46 PID 2668 wrote to memory of 268 2668 cmd.exe 46 PID 2668 wrote to memory of 2608 2668 cmd.exe 47 PID 2668 wrote to memory of 2608 2668 cmd.exe 47 PID 2668 wrote to memory of 2608 2668 cmd.exe 47 PID 2668 wrote to memory of 2608 2668 cmd.exe 47 PID 2668 wrote to memory of 2824 2668 cmd.exe 48 PID 2668 wrote to memory of 2824 2668 cmd.exe 48 PID 2668 wrote to memory of 2824 2668 cmd.exe 48 PID 2668 wrote to memory of 2824 2668 cmd.exe 48 PID 2668 wrote to memory of 1216 2668 cmd.exe 49 PID 2668 wrote to memory of 1216 2668 cmd.exe 49 PID 2668 wrote to memory of 1216 2668 cmd.exe 49 PID 2668 wrote to memory of 1216 2668 cmd.exe 49 PID 2668 wrote to memory of 2076 2668 cmd.exe 50 PID 2668 wrote to memory of 2076 2668 cmd.exe 50 PID 2668 wrote to memory of 2076 2668 cmd.exe 50 PID 2668 wrote to memory of 2076 2668 cmd.exe 50 PID 2668 wrote to memory of 2356 2668 cmd.exe 51 PID 2668 wrote to memory of 2356 2668 cmd.exe 51 PID 2668 wrote to memory of 2356 2668 cmd.exe 51 PID 2668 wrote to memory of 2356 2668 cmd.exe 51 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svcegd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" svcegd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vejcqoxtpwwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" vejcqoxtpwwi.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00280.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2324
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2952
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\Desktop\00280\HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exeHEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2476 -
C:\Users\Admin\Desktop\00280\HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exeHEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
C:\Users\Admin\Desktop\00280\HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exeHEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_HELP_HELP_HELP_2Q4P_.hta"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2604
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3376 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4628
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:980
-
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exeTrojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1512 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exeTrojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\vejcqoxtpwwi.exeC:\Windows\vejcqoxtpwwi.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Windows\vejcqoxtpwwi.exeC:\Windows\vejcqoxtpwwi.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:2980 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:3300
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT6⤵
- Opens file in notepad (likely ransom note)
PID:4748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM6⤵PID:2764
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive6⤵PID:3376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\VEJCQO~1.EXE6⤵PID:3524
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00280\TROJAN~1.EXE4⤵PID:2948
-
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exeTrojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1940 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exeC:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Users\Admin\AppData\Roaming\svcegd.exeC:\Users\Admin\AppData\Roaming\svcegd.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Users\Admin\AppData\Roaming\svcegd.exeC:\Users\Admin\AppData\Roaming\svcegd.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:300 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
PID:2524
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
PID:4776
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES.TXT6⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RESTORE_FILES.HTML6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4848 CREDAT:275457 /prefetch:27⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4848 CREDAT:275462 /prefetch:27⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\svcegd.exe >> NUL6⤵
- System Location Discovery: System Language Discovery
PID:3600
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\Desktop\00280\TROJAN~2.EXE >> NUL4⤵PID:876
-
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exeTrojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exeTrojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864 -
C:\Users\Admin\AppData\Roaming\alFSVWJB\abgrcnq.exeC:\Users\Admin\AppData\Roaming\alFSVWJB\abgrcnq.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\SysWOW64\cmd.exe/a /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\Desktop\00280\TROJAN~4.EXE"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2032
-
-
C:\Users\Admin\Desktop\00280\trojan-ransom.win32.blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe"C:\Users\Admin\Desktop\00280\trojan-ransom.win32.blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exeTrojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2860 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe"C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\updc991a1f5.bat"4⤵
- System Location Discovery: System Language Discovery
PID:4408
-
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exeTrojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2804
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exeTrojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2516 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exeC:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe"C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe"C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2160 -
C:\Program Files (x86)\Micrsoft.Net\WindowsUpdater.exe"C:\Program Files (x86)\Micrsoft.Net\WindowsUpdater.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3284 -
C:\Program Files (x86)\Micrsoft.Net\WindowsUpdater.exe"C:\Program Files (x86)\Micrsoft.Net\WindowsUpdater.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Program Files (x86)\Micrsoft.Net\WindowsUpdater.exe"C:\Program Files (x86)\Micrsoft.Net\WindowsUpdater.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3904
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exeTrojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.bil-73536ed3a05e8c229892a66694ced4dabff9099eecdcb6a85cf6c5d0da17d2df.exeTrojan-Ransom.Win32.Locky.bil-73536ed3a05e8c229892a66694ced4dabff9099eecdcb6a85cf6c5d0da17d2df.exe2⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:268
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exeTrojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: MapViewOfSection
PID:2608 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exeTrojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1320
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exeTrojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵PID:2372
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:24⤵PID:1792
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:209928 /prefetch:24⤵PID:5012
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:472075 /prefetch:24⤵PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysA1AC.tmp"3⤵PID:4892
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exeTrojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1216 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysECBF.tmp"3⤵PID:3596
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exeTrojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\DesktopOSIRIS.htm3⤵PID:1376
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:275457 /prefetch:24⤵PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysBC6C.tmp"3⤵PID:4840
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exeTrojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysA007.tmp"3⤵PID:808
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exeTrojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysB599.tmp"3⤵PID:4232
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exeTrojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exeTrojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd74dd78ca.bat"4⤵PID:2676
-
-
-
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exeTrojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exeTrojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 1844⤵
- Loads dropped DLL
- Program crash
PID:1940
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2776
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3592
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:3644
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4072
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2896
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
7Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5f392c42b03320ee51c42866f4564bd2a
SHA1b709d9940d6b967d244c8a3f15f58bc976dcfda1
SHA2568331ca5148629982088db3259496b2a2dfa4b33b17de8993690c94b027426ddb
SHA512ac26c8ae735fc22fda372d7f379ae54c689fc723b3276bf638ef71fc53612d227811f934bf9276b5ccc3d8ca71c533537a79d1f9fbb5edab4ad84caaa9695582
-
Filesize
12KB
MD5c4f168fb22da53d314803bd634c79dfe
SHA173119ce3980a0b6d165933cb31e15161f5014b5f
SHA2567eb53a08c2b231ccf67261a1090ebbdc61b03d1ba4e589393afcea97f0518c3a
SHA512130dbd859fe74963fc150eaca1994ae0dd4f2902d5a94dcf852554523c4f284f5d5615a6ff48e44ef0929002d923787eb72ae681ed5a3c9e7c56df213f334936
-
Filesize
64KB
MD5b73037f3c7e44009e67c9c209a0c89e4
SHA11cab43187058d74ed4d9033f0c4c9a3fe1dce4f1
SHA256cb4808b24da27db5f513f0ed483f25f9dd62188a9cff59ad20a8063f834f1968
SHA51214b0ca546b52b09e03e3fd70b97de6f201bd65d133cc66cffb2368f383c33718975f65d0e3d1ae4563b8c231045f792dcf968d7c7f539932401177b0d1a6405b
-
Filesize
1KB
MD5a97ef5570ceab94ec9fbf9b9c5167744
SHA14648fb281f1b1c93763d3b74ba5a36cee65f18c8
SHA2567332a6af76d7df4352a3fe4387d96efc604fae42c15e6aad7f670e7c0fe22d09
SHA5121990640f59ed032571b8be0f1e65cfc945416657c54b632d13d98f6e136dfcd80e4cc4705a513109fefd137a3560b63e8063eb5e7dd5def7f9ea4ccf4e273dfe
-
Filesize
3KB
MD565a19601e8ef05614c7aaccab45a4100
SHA1067c0b4bdf6ec9414e8303d8b8b5b8f8de07368b
SHA256149df936db8061071fcde9fd04ae26a78bfe3398770bee43c8f1d760b3fec1e6
SHA5125a0e34b85d47daffe7d73a6f5c658ad54744b22e68e88996dfbc3110de5f23f257f111ffd3dabcd3d517386cdc62148345f35b1059f719ff90d16897b0341eff
-
Filesize
2KB
MD53f95ad90ab9c69a16a670ab6b7ea8fa2
SHA117952fdeeab94f76a9a35f97a7558d540c6a951a
SHA25661feee84fb135cbc5474fc7736bbe85accdf585570be2a475ae9840bd850670a
SHA512263528b235e97633e018cad20e752623b8f03bea9716db56046ab8bbcb6ddae0ef9ffc3f672fadfa12178dd051bf9d00c6fd3eecaf81ca856b213a1f81086157
-
Filesize
2KB
MD5e6703a5ab839d3a3eb55458d7ac88d84
SHA144b7aa07b8c3898253a30eb992846ed5d221da71
SHA256cc9bf3da2ffd7e93be3668b679a10939d751197a9bb2eda47c34cdaf97931b56
SHA512c47ea72321eef9a94f8222755729c3ab6b952c83d124ef1664df9dd7026a877aa9d238e80a9575741058667f593f529c88aebb8d44c64b77286fc7088ac72b8f
-
Filesize
8KB
MD56c4c3ef9a1b9c2ead277c850f35f2ce1
SHA16c1d8287f477ca2f1a1969de33662af4ef8e429a
SHA256d749bf20bfce3094501d62095e75ea372e9891add42990a071685855a44bdd18
SHA51259f3a89b0b8ef0eebef480c23213841bdeebdeeb81efed61dbd48f1bd454d6b979f6831124dcf2385547d4bcc6e3a974eaefcff817498d92187c3836adaa393c
-
C:\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\es-ES\OSIRIS-ffbf.htm
Filesize8KB
MD548ab43be5cf6ad5a25fd341703054b1e
SHA1e85473f1155664b63482925678d0eb53c94756a3
SHA2565547809a79099121a3f60e5ebc6ae8c8e3e77d83903472fa818679feb6342b00
SHA51221796b160d8fa2c22a26c284ff037c6e1ca22e5541b1cf7a9292cee1be4f7e30bad98f85e3c1c50a0677c9ee7454c961c1c3afc4f82eb9722bff7dfdc96ee8bf
-
Filesize
8KB
MD52ceba964739901d99cb7fad2302a572e
SHA119e9b2813cd5beb54c07e08fa11f584e187e07a5
SHA256b9111cd07c58265ca3b60e3abf82d41f6d4217080aca83f32c8e3d8efa3827a4
SHA51226e0590ca6de10ff75de309e704f5d17ac45fbc6beedee9b7a6371910e2d5ddad8850be2cc906c27cd56fcc79fa845b6bdb7e39948bad30e83258e681e51b97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806a75c9bf41a442f6d0ffc160d5db45
SHA19c5085ff887e87c917fab348fa346a140d0ffe40
SHA2560e0060f9780cd151498e19b28b3a7cee72e38d9ab032a77de18e0212507e16e8
SHA512ad3f33179be778ee9a94ad7b6b18f676461d548e8a118a923c40d92573047216345e8ce08d301f8fe80d0afb11df0c1dbe36924da721087a2d17686f6a7a6708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52675411751cb3ba42e7300e960c12bfb
SHA1d94328772424f5be9b4207d4f55a79739a56a40f
SHA2565edc175457ded32923e4583ba6d5719cf672605e98cedad0303223759be70546
SHA5122c1424e48fa881a23d4618c64ab5d76fdcdf23ef71f66057d143e280561ecfe9ea6e63cb940c4c469dc973e98818d983b19c6242822b5a26f7daa83e0fe7d691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f083b0c05e7536f77f0d43283e3b63d
SHA1b29633986b8ebee6e7290798cef962e35f189ecc
SHA256c62935a95d8ee74ea0301b46494777141961c32fc4c2983ac3ba1c8d27fd7cc0
SHA512ed1502e3b7be956f628ceca6c3b7bc0fc03b4ebb2b09f2b5170cf87aa6a180bca842f670a021bf3cfd57e0e2d3bd84620c432f2a6411f57f1327579cd7430005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eee2daa2330f7ce49751baa476ae034
SHA109d14decf4ef0c9f0c07864f1fbcd65146ba08d5
SHA25608fcea0bedd2a210fb1e8d78c6e6a3533c2ff2b915c6d89ad7690917cc593526
SHA5128f0cf1bd43ef6be18ec94be88ba0c64ad9b999d37504316409abb128ecfd10101ff040647d7184419911f10922a506d7adfa7740bca75a95c512b9cade0e2753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53764387d6ceddf45cb52359249677367
SHA1bd6141f59f26cbc232671c6adf167b43c0ad71af
SHA256d1bca6fd6e8af0d22c49051540036283accb70501552dfe0bc8d0f4bc36d33ea
SHA5126e20b198dd023c6cb4dcebca159aed027f39b5d277b8851914963957166471660a06bf44bb5dc1785bd4b413c3503bcf0c1f2861a323a3e04f195263090d8d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57924f749e672fdbadf55e049c74cfd99
SHA1038d707b51c311f2d3df96c57648ffd2c3b2b48d
SHA2560071d053f62846039602a90632a89912a54a360e3318983b5c578e8c678677c5
SHA512ad0b69f0eb28926c6ef6f3187bd67e5567da688a157b4828c3875d23d41a0512f1b4a0e65d3abf271978a1963a40e16a214fc6d9596aa86434fecebf68e60b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e07dacdabe86b1396b22d13dfbc32ac
SHA1d228248c0936f722d18bdd5e059a509dac8c13ee
SHA256697a21a1b4e061ebe81dfed4748900340f990b9485fa7ee61f7527f4fa6ecae5
SHA512fb5fde185e667a9ff8f5b194b8f7d6d71e6db166e32f713cd2c3d181829d0860f24b789172b275e5b24a8494a9d5335eef6321fc7dcdac72161e99a68c235e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7895f82248998e47f8d1a03a359eb5
SHA17f211b03a40674aafd032e280c916dfe4f2c57cf
SHA256c772bbfb94e65af9b073f2536276df88b2408fd5138880999d57b7c99d4b499e
SHA512837bf524de579a05d05d0cbcb7d44f1b6424af31506c4d0e1a8bb2afc8e839fe3dedb215e00515f2999daa0fdb4e14b300613bde2f1c17937761adb9b8ef8691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939340aca167d611f1e7682c1185ed3b
SHA112d928999e15d85df0789a9e2c1acc18f62b43ea
SHA256f3952dfedf47b01a0d159ee3ec471971f12ffc06490cb8d7b3c95752a49be9ef
SHA512fb38938140717549aab04a11fede40ea7f6c9385c8e59a31758741a80babb8f0d6602249b27db761a804beee3e2b5869c7a3e2abb4025e6ee54e7ae16648b0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9547a1636792a277ba848dd73d44393
SHA1c818081ff649994224718429a43b4354fd404a7f
SHA256a2dc151f37a5716035a7ed065ec3fd85fa0d8f1d6e772c34734c1fccb8524b46
SHA512263be2adbd40a03bf2535e58219cb4304c957a45fafc9a3df5f5db7cd9a86be10f0f85136e34b442ee8c2564be8722cbf5e53a562d3204f1b9dbf2a9e5ae6a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c17176eeb18f7008b47f6188f98baa
SHA14825d2f837770c65c483964480801978bd1aec6e
SHA256de9ec4a021a8da7676578fad23f40bd1b38a8cea303092029de4a56d693b1033
SHA512c2c77345697a981dfa016a78c764eeeef4c3c1d9e78cb0105aa9b898587be42438a18635ae43b8c4adda316ad7a6fe510d9d823e40f901e41b20f9af8cbc0561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c342104ff4f49e15726bdc61646a8e
SHA168eeb7ace4b530bddc8cf749c2fff34736a7c5bd
SHA256ba86ade9b4f43b8c1593551d113db41966fb5368a29a8ee68b49f45c868569ff
SHA51236b789091a16a5ff9e2fd710b0b6eac9025d22304b373cf52b01270665c26b2a30d450325bd84ba2363f76f1a3a29493bf2dbb246f0fa4c36e9ed20dcda72b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12fddb5a7448570fd1e396c002594e6
SHA1e27c35689968d9e978545f231b7294cac0cc1aca
SHA256f5ff36eb863019a2736c9a79b7b6a0aa1c0d60b58598ec359ada7e16681fab5c
SHA512d8edb4f68c572501d610f0c424e18f16c8aa069e649b8a9b3ae739329ef317420440e50292f0c0d925715cd35b47ac0d26b1182175987c98a18a5f11c1af00ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24571c75e8c23a054326f8039ea35bc
SHA1817f9939b71f18dd78be5e1839ccc07bab8d000a
SHA256cd0853bafd9e315846da7cf8ca5623b90637a95f6383616d4fb21d5679e16eec
SHA51257c7115b34f7707c56fd398ce8b37c3f54f07ff78c1099c9d12b164770edb62a89876b7ee2715477f5aaeacc90997c4f7db8bc5fa73a24e52e3292e9fd2dcd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e895463738901ed59eb3813344a2fef
SHA1cf3e51bbe1bbee83ec77a04618e2afbf90030be7
SHA256410b85bee55599697f436eb5a602cb7fb9e1015d30ec2c1a2813d29792288b6c
SHA51263973a4150077dc789d41cb59f13793377cc68c54868cf161ff0c1ca4b4ccb32878fc3e9d1c5991c8c20bea4fcd98383c335def3449e974ce5ffeceffd650ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c4bc9ef9a9f1646d633570a565d069
SHA189e1f3eee9fd4a4adc22b7703d1cf15fc05a92c3
SHA2563cfd3ba7602df49f1cd9fc470cc69291a2db5627e366d29f64f76800a6b8d589
SHA5129a7f8cd2938de1e9121d914e13ba25bd0fa0615b7231b537c1527cefa9e993d4ba288a8507bc4df106539683f6c63b78abc0bae1739c3325cd2bebcf1516c46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c40d1876810155cab374739779e5a03
SHA1c9ce0d234bd32a7a1772135ae5c86729fc49e0f6
SHA25655f12c85f89905acd872636f29c419cbc302603e93d06554e3cb2bf1e116de69
SHA512a8843add56859af7454cab375a31abd09e1e11479ebc6b000b48ed66bf2799db6dc84624f363235e24eb5a2685ef7fd654a43f29dd23812378be83fd7c963ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c401706186be64af3d9e0976302c09b
SHA16dc20f059728fcff41ecd1a0cb6684bd009ac0cf
SHA256f62e64974b40cbe0f4c3e50bc6766b5b2fddbe2c987390ad664afdf655651920
SHA5129c96cd107daa32bf7e69a8b3c4ddee86de72d494788518186de47750225686e0f168ca6f961bc31e2dbde0c6e261b1dc6a341305c65216942ce884ed94d5b417
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230KB
MD5dc1c4866795a2d2b71c3244ffd8bb158
SHA1f65c295d9ccf0785840dcf2604539b652b221fb5
SHA256f63e1bed1a5f859e5da109dec61ce00deee8a8e897baf97cde82a75f9589abf4
SHA512788de3a31326dfbe147fc5689d2f06a1f154b1aaca594df5108b478ada8ee89656b4f585d6a641c0c654bcbee197bfe5a8602e4b0e72e64b02e6bac7f949f19c
-
Filesize
8B
MD57c83d753ca3bb5603656be99dc5528a0
SHA154ae8bee3515e5edb476ffd07cfc5185313fe981
SHA256589eff699f50b362d8b9c8f354fc5012120ce6d36357c6fb7d139e3c7b9f8a1d
SHA5127f257159c616ea6c67d4e8635d74fa7b40bd30026da0c64e6c5cc9b9996261ab59e4d865b1de64c9ec1c8c3f2d30a488e70cd24a1da3b4b6622ebf0b2a6ec1c3
-
Filesize
8B
MD5d9b9bd8e745762e3a39e40b67e188dba
SHA1d72016d93fe4e51c84766133904c4160809b2c11
SHA2561aa700a01e516655d5b9567dc092cd8f42fca8f1b00482bbdda8de67eb899304
SHA512ebf587d0b06cf56b9a8b92a90a94ece21a9497c5bfd5dc91515ef388ea4e838a860c2a4279713ad6668789620c86304ddfcd5d6cd9533f4d8969256586dc7743
-
Filesize
8B
MD5b30a361ee98a29df366729c011a8b2f0
SHA189906e1f85cc059daf476ef0904408e8e3949614
SHA2562a3808f90f780b59d9b615e40512dd5ea3d1035bb5a30e650bda3708ac5405d0
SHA512a8922f2c8978791ab2260ef266c03ad6e28273fdef9781e02ef42b8fb1c957627e1d07a72fd0b127a3029cb188db04e1d18bd220b3be1331fdf9774b3aad60b3
-
Filesize
8B
MD5bbe8b6fb7f8758d88d8659a73e781979
SHA1e69be9d9e542a7dbd7ab97ddf1df09f9cc233c50
SHA256d353635d09577913a902955075e4b1f368ebcbd50c97fa93e6cd035d0074b9ba
SHA512d2b6ec7ac4475269b566f765be6aa49326eb3415cd846f01158870b29ea49c336ec04742aa041cc3d8d451195282c8991a65e8e650b4c255a4fdd3f95a5e1c5c
-
Filesize
8B
MD5de08a96835a7b6da8f64187965da99d0
SHA1350b83d940dcf2c628a90038cf9baaf5ae16428b
SHA25674de7eee44192c875bd075dda2c0b9425963eb8601384f4978e00c5260e8a18c
SHA512b4d08243cf85222ea4ec30853935676c3fd3526ecf1e3355f16cc4b135f9b7ec55f6054ad4f2e97edc3aa845064b0517cefd01894c9e053db2519db6b5239ae5
-
Filesize
8B
MD592d2e6cc64958b885e8cace28b907749
SHA1a8e33eaf63058ca3720e8bd22b57885ee0f19ec5
SHA2560dcd308fbba1e6282740f17a70c56bbe1dd94ece29b7b931715fab8f5ce139d1
SHA512ec4358f01747e7f37cad42338947a4c3d63b737fef0bb6d26bda9db944bd42aa9311dc40157022414655bb6961d47c20284625ca523d6e1b5d97297236caa4e2
-
Filesize
8B
MD5e3cdf70b998da74684c52e1912f98e94
SHA11ac268c36a50500c25955f5f24cce475f7d6ba13
SHA2564f492f812434c1e343d1aed0f32643c73cfe52da1c319fdf33ec950ea48f5b99
SHA512e7df04c4b7712d20e7d659dd21798129f6cdebc75f0c910d536a8e68bbbc534b4a441ab9a4155dbe6fca3ac233f18d9605d40380e5dfca869f9c71ac1f63e8a0
-
Filesize
8B
MD5fdd3dfa92c29a3c71698fe62be28630f
SHA1090f8798b133c9552b3857758902ce9accc239e6
SHA256825fbbad77f75a50ca89cbd674893492718f382ae7a0842b309acaaee1caccc0
SHA512fc87a221a4166e9bc9b5aa525de1e0e18b136ea880ecdec58e07609da64ec0f154d16226722064051cf064573492cac300074a710bc4403637ec510e8307e3b6
-
Filesize
8B
MD5c5a9aeb48ef51607eb24d6df36106b81
SHA12c40453acf1951cd806b1a854a18e9b7aca168b3
SHA256a562160c4b888310014a07be8d09e42dc31cb2d2b91a5659d7b4b995ba11806c
SHA512818397b8c949e25fbc415f4b75073de279b8063e3df57f322836424374a18f557a6f3f7f723182bb54a2fb791024ea119277643e3fc99d12b5ff5275943c02df
-
Filesize
8B
MD5add89352dc2a46e71b8ffe2bf383ea31
SHA120cb8f18afa2cbddc90039413783cb9fb339ffda
SHA2564bbcfe91a432b1e915ddc910c16828176c3e40adb86c90ae77fbc52a2e9f1067
SHA5125d5cf523ebd60b9b1d6c671e90ed1034be7500d6444b0133f11927a6caee9222f37d1fafe1292802fb3c9d5c4e84ec4fcb529abff3a5b7e34db017d6db9d307c
-
Filesize
8B
MD5e53732b5b1512947d40b51b908aa6bea
SHA1ade7479d5c92250b9b9c8a1efbbeda14fb45c426
SHA25694f34a7d74a6485bd46969a5cad111c6029a2f3a314c9d308d24ec96b75e5315
SHA5121d1e04a9a8a9d380e29f27337a30f9dd0c1948aa74fdd3d33cf2eafbc7133fc0e77326d3bdf5a7d8f92e8c4cbfb782ca8e23504f1fd6b1b6d2a34f6962b639bd
-
Filesize
8B
MD58b50777714938d15d13a60809d830028
SHA127110475847095b1e3111c32303a8ea001ddfa19
SHA2568f4029b1aa65319c7594bec8798960650ef57a5097625bc3101de6f8c857c7af
SHA512600447524eade1cbded14c4a27513dc5b420108b69008bf167f153f7aced4265a979b81b1edb56e335852cc1fe4ffc6a16c4ee67db41f771c10eea9e00e35548
-
Filesize
8B
MD5cecf9a7d32c7449a20a30741df5b9c63
SHA18c411d492ebf23d630b60598b53d993a8b5feafc
SHA25690c6fb439e596d33fe27732c8c1ee20d4f86e3ec2397935aaaa07ad38468b844
SHA51203a507df2b74111cf2abdabd2cd35aba662ee78e05813d71986e37140b85ca9b04350819e2829fb7db6b2c3872110efdf35a51cb97799c05154c9e78bb35ba75
-
Filesize
8B
MD5a0cf63d2bb34eee805ad23316bd556ba
SHA12491ec231820e4e9d399e81074d466349a56feac
SHA2560cad61843d61336b21400eddc1c6ee521a8786c16803c00cd06a86ff113d750b
SHA5123cc15af5ac7990294a8187a1390a430572a40c2a1a03b095e9e53ebd39e461de44f901dd4bdd44ac68c8f6002b6e8c5d5c9f8d349cfa8444d897aab1972cce16
-
Filesize
8B
MD5392a95cb8f663eb3fc127f38e7352f41
SHA11b9392436f36a18ee21abae2ad6b4fb255ca6cd9
SHA2562c37cf736a170c1007d254f6d64ede7cd36efde6cc1b79f01ebbfaa465f4f124
SHA512bcb04678ad674d2f0f16c4567f4d39216eb6789762cc8a3ee3a1785a26e3e6d28a9cfed0e5caee65d1f0b85de08fdaffdd024dd2a80e7e582bccb4eb7d7d5999
-
Filesize
8B
MD5ecc1c06c83199aa097abeb884cb13789
SHA1bb8da8f2fecdd49e5aea070bf1335eb1bbfc18c2
SHA256325a35c9344a404be25be71a4072fefe545ad107cc5cfab32f34f22bd430b416
SHA512b99abd9d400dfbb5b579f2b95651a79aa73300771d721c83203551a63729ce7950260c9c0a60f80735fcc5a1d4e3e93283a8f378c4611f4ce2c6d0f7177ebeb8
-
Filesize
8B
MD514cc6fdedc91e70386e36eebd40d595a
SHA1b4b45b65f7dbb1e6b3294e8e7fdb3cfd96650974
SHA25691ed5c85091637f750a7701e2ab7b9f2dcbad388e85bcd4ebae11f85021a8377
SHA5129d03f54ddfb70ccc64318fb5763bad1ffa9b4971dfa89cee3586352b7ea08ade422c1e6ffb8bc35a743cd38d078e053cf4ed02d20e074193c2c102c230107f4e
-
Filesize
8B
MD5f58fe36d341be85ea3ebad2b68b69cb3
SHA14b16be2a29a15bfc113a1d12938c2d2c50fd5fe5
SHA25659f8a475015263d9c44a3fff66d35929ef87cb1e94a2a4b49fea7b1b06626c03
SHA512729f77dae8bad8508baf0ef0c13634b81321069f28518cd2c21fb7a5e200956dcf48e1876b18477af76237e27dd721fa6fa9276fd2f008a2717eabf249b5c43c
-
Filesize
8B
MD5f32aa6e50c4bc690bc7d8939b1bc219e
SHA1e4e1c0677d6164c3a7666fdcce008e98383edc19
SHA25649546da2cf331ac19fcead067315f743725dbea89107fd21c622356db434228c
SHA512686dc3d23e0c74a877d8508ac275734f48780c1ac0f8c1d7afbe0d070bd40c4710f1f54a1b2e0377d81229e6a2ece5850825de10f3b01de341f46137715d7f81
-
Filesize
8B
MD5885964947644f60787a8fc1164c08a82
SHA18e92f55c86aa545a4db2222825f3de353eb9a3fd
SHA256166bb96c2d3564c567eff088aa5c92eaa484c1b201374a7a638d376d8704be64
SHA512857b3b34326961ae24957ffd5c930322f01e4ca018841d81f78405069759a744dc4a4ee51ce34e1abd154a474c6fd839b80622a2b7dba7dc1f96f747992fcf87
-
Filesize
8B
MD5e17d89daa2951b719acaf9317e0a36d2
SHA192147eef202ed06fdfbc8718347ba11f4d5ebf28
SHA2560378c331e998e6df97db2d67b179819b9169c2047ae9d5c2137e9a3d5e2d16c8
SHA512918f86911e832999d5dd6f6f43ff8807ade4cbfc77154910f2236293bcaa42a396bd48142d62ae944c1e1d652a2e198eba51b1fbd07c162422e132d28bdcddfb
-
Filesize
8B
MD574b60c7114dd0894f6bcd3a8076d48df
SHA1b7f6a51ecf48ed5921688c1dee153802903986df
SHA256720e1093b26d07e10fa514542b1ad19c148c658309812392abf61d0f1b29bb8f
SHA5123d78ad1b439f26edfe73722a2b3e5b34aafb3c712ae9532412d7ab1937a128ff9b9578db8a54ac7c946fe14f223f442c6320e2ada331f27cb2113e1191c9971c
-
Filesize
8B
MD500f20c8e63359e99461d51f3ab92731e
SHA10fc28fbaee533472200d201fd73c753dab584a69
SHA2565d6313db1faaf14e503e7aaaaec2b9f6947b6b11955e565999f6627d43cbff02
SHA512d0638768ee4fdd77ba185eb67237b74231fd0f3695f1f0ab208464e8194f9426a878a2cb1526b3e0e1ed08848cf77abe403b032bd215138d29b6883c9098d151
-
Filesize
8B
MD5b697230fd7f2f080bf41b88b74f4d169
SHA133e22aade76fcf22f78d78501a3bb5021250db7b
SHA2569a0871c3da524e6e70d5e54482024f12660ff863f8cf7c4fa158a5491c9cd87e
SHA5129afe4c3f7dcea955434e980b526e1c12961a4a608474ac6a5bbb85b2d0b912454a050c4f12f246690a6db5dcfaaf4bdea7886b15fd26247c46a9b10c8ee61178
-
Filesize
8B
MD56bfec3577cb4689efb901ba030e6ec9f
SHA166db327ef76635524466e091082bc5914bb5a967
SHA2566e777f78fcb95e2271d853b20f0610f89d9c0777840b63898d60e39b31aaa64c
SHA5120dccdb00ffc87809e29792cd54e7855ade9a3fb75994727b571692722c396be97687918e27ea4f067beaaf1d17728b2b5f7d6c5efabbad71dcfe4efddadb3726
-
Filesize
8B
MD59d62a3288c03b2b3f70cc6afad1e936d
SHA1d0023eb35b8139af7122e49febc3de3b8952793f
SHA2563cbe70a85f80b4e2338d35952b113913afc244504b211b91e5a7f7c02a23983d
SHA5122a31aeb5302387036cf0f71d90dda71d200bb81ddd60ecf46d8c468ba55fbdeb9eb29b81b3ea037e47526c755283b90901e83f9e651d31ae96301e70785b4a9b
-
Filesize
8B
MD52cd1324c0af947d75ee3bcc52013d36f
SHA1c960e75a376760e46b4b55eca8a1631df52e6cf0
SHA25600e15e5f6f23a8c362b49b7a99c090a88d3878ef7932adbd25ba176e66fe01e7
SHA5121fa6621918dae3142ef80ebd5f86d3d6149866011df48fe7fa98612a5c1e6f4e72875f3143073e8ccf0180b7a47ac1d90579597b6a2611e258bfde72201f461f
-
Filesize
8B
MD53d1f4371a25a6f5b2d9f34d74ba5f967
SHA147b5b00a090bbe3ec5339029022f37dbecd29eaa
SHA2566579a16c117198c20967e41ec2f5ece00b960a7344d7dfb7a20bc71d7d8bef47
SHA512eb28e8eb5f3f923b6b2ec147eea6c28c131d934d283fe542c594a6e008ae74fe84a084e550ac02444bf533d92dfe9fac80eec884dfb93b1649f26eab82450a92
-
Filesize
8B
MD58966748aa3f3e73473051f0695e24f72
SHA1b1a15e8655da8b06a0454fbdcea1df311d6e6d4d
SHA2563c2db47b4a3fd86e5207e5a21b9495eb6585fe5f6ff78153d836bfafa1c0799f
SHA512b374a6767e89f973be94648cc4edb6d00d03a2f90bbed3377ab507b5a2235ffc332b451ffe6bdc45da0be289cc7942bbd336369e79244eff1ae204dabd350c25
-
Filesize
8B
MD556cd5bd9611890549e8de3e2427c194b
SHA12c3b5c74ea7cd94083cbd7e43bd77ec15e4b3829
SHA256de1c7fe0e6df3a1f06db9a1253f670a5961d0a7e965fbdf024d3efa86b35c035
SHA512e266b9c1ad77a71e02fbae791eabd634d9bf840eb1a24621d7e2da3035834c6a19525351df2b0b4ea006a139ad6ae87bb9c40da61d0348f6b233a7523a06c945
-
Filesize
8B
MD54b118c2fdb8369941c8a47f734228ca6
SHA1e5f94b10ec2ad6ab34dd4193a64359596968a629
SHA2568d4544757d1c827f31259e67760393e711248da6d5514e49be4f996c6083c7e8
SHA51276965630e5b5c395fb32413ec9ea74988f92fe81719c61be831a1ad3bce306da73673aee0b1b051ce4642214a56b1c33208304fdbf4d038908a986fe932561d7
-
Filesize
8B
MD50e84bf1c4b5043674849b177cb844531
SHA1cf84559bc217dde20c7fa6e91070d6da939be5df
SHA25655c571ce3a77bbf36d468487ddbd16a291969799a305582125e466aa42645225
SHA512a00c33bcf516124a9dd7d566362d957fb0b2018a3f0004640b0cfc7d3843898d32da482ecb80348699cd926447a5d1c1f8dd8c67c39271783d9501158718c94c
-
Filesize
8B
MD56d056103e713bc79044d69d560a26bfc
SHA1a711f974444849789d4f45fc0ef43905a20572ac
SHA25616a47a6525948822a4291a3ae4ea6d8fd9d60c43caad505647b67c90462408e6
SHA512b21f25e97d03975a837a7cd4df49c98f00884fe708fd445b175fd2da8bceab66fb5fe28d757f6b1aa27d200eb7b77d5b0a39ecbcab1adf7dabc822667669894c
-
Filesize
8B
MD581687ce2934ab0b7ad02e9bce5667b02
SHA108c58b32f10204e36f838ed113e34020c64c8817
SHA256099efd1ce18574f3fee0f4e8552246755d0cdaadef735b266abf6c57aa7c23b1
SHA512c9d57c8b918ec8b88bcb695075d275e0560e401b2f88e055be1c1b445d91c59c37aa4b3f3f7c32b9680fbdb50952e11ef4452e42ca80722008fc6ae6aca7780d
-
Filesize
8B
MD5150f8e5bff344fcfac3a084dde4b865a
SHA16ca322b3dcef10b49e6ba96306fcaa90307c44fc
SHA256eee7ba5078a28b50d7eb6bfdccbc9cbb7291403a6cd4b8ca706df265203431c7
SHA512368a1a7d291ae6329f01a3b2b08a8e638e8aeb4e7bea626b1b15ce4052738e5457e85b8b2edd3e5c0d1b02c24f07fe5ddc8f6caf28146b3eb62dfed7bdc1e957
-
Filesize
8B
MD5554288c01661864f3d3344242d940acd
SHA197292c17e1ae7979c6e08fb69ee06334526b8b64
SHA2566e1ec217e09374a136a47ccb07e50d6e6018a5be1430290a7ffef958066b6546
SHA512aea93110cc7be2d0419d561702b9aa553df902161eb24c21a715da5767a9a3b5c75976b02fc6ca5cf40a4b8d45e0131310c953850b77cf102554abd8af7d7567
-
Filesize
8B
MD54d21e93b534e61646cabc0f9323268a0
SHA1f8428501af18494b397d9e4966960ff8b5e21ba8
SHA256422e39b6f58d7b4717a9a7c7a9311f2c3e21d84aa7f2910c93593651f5e18977
SHA5124ba0f45b05bef733a8fc8200baf31028dffec7d83a6bba51ea56adc8127595e9690434b4fda0b1ac3670019eb7a6e878e807dbb0220b1dc54de6b99c57526884
-
Filesize
8B
MD505e84d7dd598ff433cbf66fed690d326
SHA170de9b53e0faf5bf24ce1c1bfea6fd2d4d41e873
SHA256329290c15cd193c1bc90750e3ae870b4124edc51f02eba8a8a5a5ed3802588a9
SHA5126c38d16d51d1ca4ec8e34f13f26aaf91c0ab6e22de54eaccd861a3115bc6134be9996552114aaca7e6a52a4c9af5452383f1f6c8079089e5fa3b45ec75ac6d43
-
Filesize
8B
MD5bd91f2eae7ae77a007cd43da2647413e
SHA10c41d2cb62d8223cc07ae2c4277a849682858ccd
SHA2567e7bf7feb12412dcdbf30e166cbf0db48c9fba8d70b649992307129fc7fead8c
SHA512e5a46174b3953f3bb10b38440a180006df852b4073075bf5a417e5a7a50e0d321932a4191dc494c4b6ccf1f2248f7a0700d6f4f589dc8220b8920b027c2a5259
-
Filesize
8B
MD53dfd5a22fc36499894b202ac8678189f
SHA1f6d6951a0332c8934e59b76f0a845fe886e8142b
SHA256af63b98fc1cb4ffed6a3ad2965d8c80301aae4274820bb60e653059ff544cc48
SHA5128c6296e3ca4eb606367a3e7a5bb5e15d3a98fcb3270778c45b4c8fa8ce1d391942b9052501d8d65aae48a4eeb1efc5676d0b673111d0166e304fdea8bde9da9b
-
Filesize
8B
MD52beaf3b2be1401e58e78c637ad05cf18
SHA190aaaea336689adab5f219032f429776364605f7
SHA256115d707fb6de0fe975892a1af4452337802c26365d189f1c198337791915cce2
SHA512c7130ab99aa7fb478f7837f3bb7e359965a61ba36a815cbcaa9dc2434f39695f5a91c1e165cdf89f62d66fd9134fb457f657dd180727a372fc96c6e9d4516315
-
Filesize
8B
MD5c344e006846bc4525237274721f2c95d
SHA1e2e5fa9d25c1fb8021b2c3cb29d2201477e9d4ce
SHA256d85f4cf090bee18119579e832783fa13f8da1edd6e8c3a46586b419dcb64206c
SHA512d2b978f2eed4fd3e4c268d302a0a61fce020b9435b7acacf0be22aaa0b5fa13a52a95daed35eb0576d70234b9afdf35ca76270b222737f05a42b225ef47792f4
-
Filesize
8B
MD51cf765ecdf79c04773488dac4785327e
SHA1959fd2d22c4b47904255fe3c418ab7c6814c4140
SHA256162172801ccc25363aea0ceffde08b4cae340b839fdfaf23b4664932af889462
SHA5123bc547356b4c4d35b1dcf454249fc94b164b0b01888d26b104203967d179d9fb77c0bd122fc9547cae78392ecf866ca148ed4ade91d433ea8225277c420eff88
-
Filesize
8B
MD5658e34351adac22e964445030aa34c54
SHA190ea8f364047a951ae0b935ee70c5c7688938966
SHA256235a74263b15289e02f9ee6c778fbbe11efce0e0a8f3d92c1d752497ea5180b2
SHA5123425da4d8bbce3f78361e3495acb09d3a59b893b0275811932b17cfacc2023fd0628bc43fc78985791d5148a8750324064cfaa42acd1b0cb48bb1fa6c122623c
-
Filesize
8B
MD5b32c78cee9aa118ef22f03b42c5afdc7
SHA15d0594005fd375648c3fb3059b730ac6efbafecd
SHA25603ecc90e8b098fc464d5c4ff76664533c1002c74eb05cfec7a78636b2cf1a56c
SHA512f4d13b422b89f88aa31fa172a6b8d7eb79689c7cc040090c97511d7f0cd3ac7afad2a94321bfb99d59a664dffdb7f0ca75c9f2caa22ee4ba68803755a135c1c9
-
Filesize
8B
MD5f19583daccc0d3e05165000638fcd1ef
SHA1b5d56dc71a557802e220dd78a258975a19fc75b3
SHA2560a8c39512871424c7ccd30104ca2692bf23d58ab6b0ffbb689bb2a2c1503682e
SHA51235ef773d9538cd01db6e4f1708eaeebbf9777144f715fa78556cbbaa1aadfe7fdfdb1f61efa192ce682f77d3e75cb181e204f6dcf0745682908ac86826286d65
-
Filesize
8B
MD52779c84ceced72a3d34b16b6df3a2741
SHA1bacf8a924fcf87660c78b38932458bf42cb7811f
SHA2565e1ad37e803217090dbb19d5f0583fe9b6bbd97760361bc61782573504d08461
SHA51246ecf84435a008aad5171380ceeefdcb542318150bc8f06025d1f7e1e2bc8871072321d1ec957843f61594e66d276574a8a094d634b97b14b200c3772f144601
-
Filesize
8B
MD5ef7ac50936ae2e46a011b684ad536152
SHA1de94ed619e68c9918725f4fd212f5515d7a3f0de
SHA256e008a891998eb3fdc2152a975233bf6098f3159ee157c905e791b76f0bcbfdd9
SHA512eab41ffe50cdddd689520861458c5bb46dd47b4fc2c46d4b55773e66e799cbb908d9cd5b1a705c514763a99af85919439d7ae716db6c2161e3585cf895e79994
-
Filesize
8B
MD5f1da893554eac6d898b596f0f01e02e0
SHA1786ad67478da876d6be58a2bbd087636676ea8ba
SHA25624f4dbbf16d66939523da59496f5b7462cede55a04291a1e77c7a7fd27c27d03
SHA512211e12e186ff935d827f48aae6bb76853c320e44c6697824cb390a9eb238125bcce4cc38fe063340148cadf1235fdf5bee6f98fa9a567719386573102a64588e
-
Filesize
8B
MD55286399caafb6d2f152861c8df4f21ea
SHA101c9f9ee300b392aff1fd536e1acedb46b07eca8
SHA256940acaff16fc5bd092852da79b689ee760a9c4357d28844404a5ac1783d3db27
SHA51284705cd71c1998f0b1f71afa6796328ba9e71d2a708d2463ca8164dcbca21db7d4418df024c48b79ee8c545c7c7be25af0dadcb14d45c8fcc8173d1176a23a12
-
Filesize
8B
MD5734339e3dcb0dd446bcccb852ccdaf80
SHA1bca375481f3e554addc47a5c36692438a630945c
SHA2561547acab6d10c894e1c9b9a05b381c769a4af1c61fa3290f0c0b43a0f70be7f5
SHA512dbf6baad219a554f20342db66fe6b718e12058d73854f426e65b3739e62372855641cd2d4717893915e57f3746fe7d0e16a370382a4acd8ae7a91d33080c7494
-
Filesize
8B
MD594c0a1da54ce7dbf748a34b8664bb8df
SHA1c1c14bbee1367a770f433ae49a0f67a7078fe0ef
SHA256221d6b3c60245c0f4374b8257a7b0e16e8090518e20742a43bf3d48007bf41a9
SHA5126a3eb051abf7a7978c6cee8cd4361047f5910ed0010a6d4b32b51b6628a44a4a0c6d9f778542b895c5dd6e40c1a3855f331fbb9348fc734524c506f44f3d378e
-
Filesize
8B
MD50ed06331028d63d49b4ee01f2641e352
SHA12a76c44528446443fe834ea00504df8e925cd000
SHA25666d61dec7c65089d46126a3491ee7530969a4cbd60a211ce42f2d286cf1fc4ce
SHA5121f78ac0ec1e8aa9cac135cc5e0acbd058b8409b687ed71f6c36a1748d99d619cc224570306608925e745835c85f424a2815e5882ec24199580dcbc33527897d3
-
Filesize
8B
MD5a70781e1e1e8e83e05dec16f5cc3bdc2
SHA18b67383ea64f44d329c6ef7bfe3e7d67ecccfd27
SHA256437533fa48693a96e92d8da65c3f7c518376683003e4b5776c7a5b1629abd8bc
SHA512d0c0314a97a0e86392ca0b386382ca1dfe9bb01d06d30bf74da20cc0c553f1c446b4a08f8dbbc1c768d652f1c3675b6e3602e01582b7698911444e29c1e4276a
-
Filesize
8B
MD5c1fec3327adf9fef24afe19cdd8172f0
SHA198fca6608e8f2bfc1fd34850d9ceb9b30bde97c2
SHA256911ce20eaf06c7e627f3576866f90a5450e0a94d0ec8c7c0f13d3b3c2a743bb0
SHA512aeb9a46934d5f7877cb4e5483c07101a1f32a3bc7c7129eb7c2edae63e91f78fa6e3abb7106cf019bc2c7202f2a24eb1d390c5315d8f947d1e2b5428d0b43f89
-
Filesize
8B
MD558abce4255cbb55cd813ccaf2d766994
SHA19b907a75cd401c86ea648c1f5f4946741fe8a76a
SHA256e6fe5fc2727cfde203dfa19b75b82bf9a6adb9c4a5af2c4de939839f3a821bc6
SHA512a3d654c93dc7d33d33f6b9527a9a858a3808aff3cb0d5c01c4e710da4c2810061bc161183a57b91ac9def71305772d98d6275570b05b235cc216acdc7dc76209
-
Filesize
8B
MD54bec79e0cfa17c450a618803aa2b5bda
SHA13d609504d946b86f60589229ca44f07a828deefd
SHA256ef1eed846e3de911f319cc90f26c8d8359b3a58934e9da99676c2e03302afe49
SHA512a36dc78d7cba4c89cdc944e753345a2a223271bfe3e6d271c380a43a3767425b09d6e250ba72c446e8ca7653c41e91614c2ebccf209e32e01a4a27e45c3594c8
-
Filesize
8B
MD534d92c2987f6e95b83f84e300837ad18
SHA1ed4e214b926098ffb26edda4c7c139f7b72e5c05
SHA256214aed4cff482c2355a6c17908e88eb595fc9fd62e8e6ced533eb77a30a30a74
SHA512e300a3e916b7132f96f271a147232322533cc6280be96d7cc0565049fd8aefb5ca8f6e170fee9e4ae4262db7f7463af068e19dc5175c4e63781e1ecfef59ef94
-
Filesize
8B
MD54138911eab5f97171971dff7eb4eb590
SHA15f7d4053ce7138af22d01c1124bb047047afbd54
SHA2564a1b206afa26eb186500e684bfe78da8b9b3e8e644d5655d07d5004737c4911d
SHA512af78484fcfb0aa41c8b0ad09729a73c813c2fb5152d5ce009f743e0f59cdc9fffa9634fe519836678b1fb9a6574e3fbf1708a66125f44c0d2583632192cdb2d1
-
Filesize
8B
MD55af9f460734a47d73283fcb953aa764d
SHA159bed2ee4afb0718275b6399227d7f10e8f54a23
SHA256cc21b852c2b4f971a3645d6d56d31a914f8a2c5ba3a0e281c1e699d4f988e0e3
SHA512f7c727540eaa82d20ef0f1e8359f62cb0cf813352bc9faba1ab8d77932b577688c66c05d883f9fd31b2fc4d1b6366393141f7c51b798993651353d8bb2f79b79
-
Filesize
8B
MD5fc4fc5bb368070ca8d2268b506b16fd9
SHA1998af69cee953eb10634dc9e072075a226b797f9
SHA2566548f1e01c05c3cf357218d15790a7d1cae81f254e26a6b5887942d24e0e3c73
SHA512c257deea8cbd38a2d48822158dd1709f0dba4c96d6f8ceacf34576a83fc053479e69029f2ded97ede7c32f9b6e1fc7d7271585dd28ec9fc156c9b391abed2919
-
Filesize
8B
MD5a7bcf93b2e933b7cc828cdaa41a96670
SHA1fe7fe6a6e2b8c9f0a4c6ef1c0f8145623b87e203
SHA2560736c6dd3c4f7502d717078d58227f8d2c8eb79e9435ee8631cfc9c5d4e15750
SHA51270b028eebc28aac649fa2857d797e9d32777b0359c9695e29e4605d099a3677358df5d8ad6d9170480bb7c9f31b399709984883a5958ba2384424ebdd80f2413
-
Filesize
8B
MD5fb6445b5335a91922c5e6e68cc71d520
SHA1f21e3cd41ada38f307dbd7d89c3e87811278416d
SHA256b5f0ddece953bb5203c8d7ca0039b72acc90b1df5849655b6a99df58ec3ef75c
SHA512a0df91c1eae6591318f6c29e1d7a47b5d99d8f1e2a1646d7ce51e42dbe22041ccc5cefe8a82e2485197bae028c7f1994c1a77aaf769bcad6ae9636d71d3c0834
-
Filesize
8B
MD5301ef0ae21eb58f865d649e35e42abf1
SHA184c5274e06a3ab126ab1b74608cacef694d01849
SHA25678e35f8922a6ff0b9d9b847d077dd0eb9a49f3791351e5ee30aa1d4db397875e
SHA512b03845b134841c48b900cb6218ab6f93929413a3ca570cf87fc4cb474345a60423f3aa500306c1124b0ca1aad429cbd5d5828155cd0ce5d97e4125009c8b9a93
-
Filesize
8B
MD570e3609bbafcbcdeed8e7a40d7b878a3
SHA1b6e24e2957aa2f4a100923f17c80eade30d3aef7
SHA256ec4256335d7cd3faeaed5c11e81a215f7700af6cd73553853e2150c7c6d87144
SHA51299d85c864faafe60aba78ed73da5fd60348bff6fe764c1df1875a6e5241916e5aa1d1fc05c2ce6183d580c3b55d9bd4de261f3bfe95dac68ba3c8b326453353b
-
Filesize
8B
MD5f12bf4538897f8a3c64ca2c6d4384ebb
SHA141d64e502c7cbd6e5242caea1bebcee6e2f883fe
SHA2569c2d188ba427261a512947e2c1ce9a99d467f735a78a73330780da045e8d7bd3
SHA51250cb1bddc319c01bf76ee5e58ee040c3289247d8530e57c1c248083a4a80dc225a04de5ecf0713adc941422bdeaa9aaf4bbcae77877b52bb375330c0bc51596f
-
Filesize
8B
MD54a47444cd9814017712187e0414763b6
SHA1d00be91bc2dcf0c894b8251f3acdfd2b355a8ea4
SHA25669b050d69c88f1e6c737b00ffb83ce8fce34306e73a6a622edb3b9b5018a3157
SHA51245e3b93615673351b88ded527c98256241208c32ace21078244c5d4908cd56e4d549eb04e496e6cd73bf141e6d9148aadde4a1e45d1c5b4bf419f413f18d3a9e
-
Filesize
8B
MD5a23f2f80238f116de4a2ff6dfd4a2361
SHA1e6b0bbbb168bd6333eef078b8b5c5794caa35c7b
SHA256960711f6c094e59ee0e80cee410b24ccf364a6a94111f4402488e3e798a95fa2
SHA51237256e97ca3763ab6451bb0d496a2842e0b158a40d59687104ca6d0247967e2bd69f929f16e7f9a30cf8b5ca4c998f732a424a7ee4916e38ebd9f6be3119816c
-
Filesize
8B
MD512d99153e0de1bcc00a8e526df404622
SHA112d708e24c80fb8f2b17894fbe3013a49a1bb6a2
SHA256d87dd546285b841e9df4083337e7df9f064ca70cabe782307d0fe171efb46f22
SHA51248809541cba1d91112fe648fc7d9e9687548aa6864d532c7a928ae5ae962bb62ff7d4dacaac523397b33b5f605aafe9d7dbcd10c628955fe3d87b4628e5fa552
-
Filesize
8B
MD520a9bd6007a55d46c2fe3b418487ed11
SHA1f53fd2f07e14489e4c0c5f3896593af3e515e680
SHA25650725ddb971d8179561c947e566869d461f4a1147e1ce75573cbe0a054d4abd1
SHA5126bc71336166138626e3a8f9110b571289acb86cfca8709344492da561282aed818e604555916c7961fce6acfcb9af957c7adbe7ae0bed69f8d7bb4aedba4167c
-
Filesize
8B
MD5fa8cac2642ae5bf334c125222503a7a5
SHA1365087e93bacfa4d92605a866d831491781ae99a
SHA25644ca02cd3f3ff2c17f0dd8083934f1dd87524b44f8971633ec14e1705763b719
SHA512a996a3e8886e63fa6cdc78232a87f2367dbbe2e66156e61c85b8cdf6519a025a27f60cc60af2d59dfce0411f9c2df1a2a39b9817992cfeaf384aa59ba49e0d44
-
Filesize
8B
MD5742601873ddb027377dc5e83cb14ceb6
SHA156921441d6f0a7066573a36c253f4955e9519ea0
SHA256b8e2a78536832cad697cd31abd74091fcbf2609685461cb07bb82b2c1a6292f6
SHA5121c60b746143507dd53367f14f78d88436ebd05770fa2c1ba2b2d9195424483646afc6859522443062297c5b19126f467a6774ff48eaae3534213629ca5412e2a
-
Filesize
8B
MD55b00c295231c51ba89cb867768d6b628
SHA130d648224d52b9faa872432f36bc64488defc967
SHA2567d211acc7dda6a755f55ce793c118d253f1b00dc140782fe711d1d7eb3ed61ab
SHA512033840d3b3caa540eada42dd60915613e9c91e3cbbe104df6e3c0849e0f6cb6e9c20c6888e6572cdbc2d6bf8aa968884cd130ca3bebe40ffac8a1059415d320f
-
Filesize
8B
MD595f4c7f8fa7123a27964e35b98dddc46
SHA14cca9358b5b0c20a053db9f9330158544f6e2563
SHA25668947149a22b395f413b741263b5ff636c583923ff90b7d752d919be2c0e6633
SHA512dc9ef8722857200820e0e61dfe0e3dbb76aece0ed9b8bbd99d4dd49c8fcea73e409055e0735ca822e82f9942840ec7edb527074679fe1a5ff1e84452144706a4
-
Filesize
8B
MD57f1b6d9ec023f03bf8723de52799f35e
SHA14c40ba28294d10f5258fd13e6aa605aecc7c5eb0
SHA256036b43874277d3c32627c07f921ac10251073365de9ecbfc798bd6986e35a888
SHA5120e093c725be494e66e1a986916c552905eab2ec16e192dd99a63c9d0ee4ee668a7d6c978ecdd871352843bb055bf3c0acb0d9529278219c0bc2e851e3cf7dc5f
-
Filesize
8B
MD5890ce67d6230eae8318c8561ad554751
SHA11fdbe3d121f4ff9a377e38337975c37e63f6bb64
SHA2566afe7304950c04e6fbe31f738993efecd4023bd91b7e90a8e63f7b5863114747
SHA512441aad07eca43fe45bea874ace224990caa3370607c4f2d9c9e85e3e1165d0293ee646aa4f2cd05b2890e605ed46ad63cba894bcfee4423d2bdfcfdfe3af129f
-
Filesize
8B
MD562c6d6c4a0fa16a42dbc0cdf5d6d3063
SHA192ad1b4d8ecfdada73681fda9a9032150c27927f
SHA2566a1c29f2172df392f96909b401c9c3c85ec587c5d8dab83efe0030902e385cf2
SHA512d8ab37498f045e171ec4f9a76cebdeb56d77ca142c1f0d281d7f203b98f00b20aa3349b015fc90f4696d2a07ccacbb1e16ca235a86014d41519342745c7a089e
-
Filesize
20KB
MD56a97fd3af9654a2f114a1ce4ec8ae665
SHA1445327cb3fe08470afc28e6d2de9d039f66c4747
SHA25635ad230c5cba27984d24eed56eb50d14a429665ea4e0f83c78736b12af56b658
SHA512e516510d9f354299dc5242751f0ffe61a6258cf0cb43822adb021a33a4247b8a07b72e964ce4a21d9dc1af095ef5f9eae9f07247bd2ae3f0da0fba1e589c6f2f
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
C:\Users\Admin\Desktop\00280\HEUR-Trojan-Ransom.Win32.Agent.gen-da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238.exe
Filesize867KB
MD5ff47b8c77dff4b1639888c20f1304461
SHA19f8ffad7dded21232264bd71de05aefce83842a3
SHA256da8d3a302057f665bb8c603b67886e4853d3c1afcb009fef111e10974c92b238
SHA5123239a3ed71e22d431db9fee2c3e16ae904cc4f74378af916db99f55113f2ca6be2f9958721198c9d3f96911caa9a264256393dd5d8d9a058c599573468d6aa88
-
C:\Users\Admin\Desktop\00280\HEUR-Trojan-Ransom.Win32.Zerber.vho-702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de.exe
Filesize268KB
MD50c802a5d931544ffd1c78cf9e18429ae
SHA1bdeb29fe44fd195c8b101452ae159d3b7579df7e
SHA256702c282138236c7d0bc0f3137f77562035083a18d7113a79eb0d15d21875a2de
SHA512709b17658e73d71c00e2b7c5a45e1ecd4257792a76e82c13fbae96ba10cc5835dd4b9bc979a08e4c591d406abd6572248e5cd047f3e942dc40534ac9ef8509bf
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Bitman.nhp-e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67.exe
Filesize425KB
MD5da2d9ea2c616e08f7df9426c41f61a72
SHA1fc485d9c011012c82b887bddd454a84ec55ea335
SHA256e502eacfe37754cd56cb2810e4261e5c1959a285f6c73ee1609738edba738b67
SHA512ccfe8422b01f7d1b433b709c659df4237ac939b1f09bf7eb6da37177f86229bb7042f5e2546a9390029698c86012c375fce07e38354c7563cad39871da927374
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.hlgx-f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1.exe
Filesize408KB
MD535c1889bc9d2b48ef9e7c0e8668252a8
SHA152093c420a93c079376d8e84d7979224bbc52f2d
SHA256f088b9148070cd3ccb443f202ad94c1ddb01dc56526f1357c52d8c8ac97aa7f1
SHA512c09aa478a808b36a352e660f2de83feb4dd255d5100e00b232abaffca4575bb2c0e3d62d9d43fa8db841ed3aa87ec2a6eb333808adcb64fd4af3c492c44cbc0d
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.jxfe-7794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564.exe
Filesize1.6MB
MD52eb4a4fe8f12461c4966668c49a1b9be
SHA1768a71996f63a31897dc302a1bdcd1b557de3cf0
SHA2567794e2c855549deada8242998a8104e33664ad6d208f2d1244ca2548acb94564
SHA5120f33c0546bf8d82044cbd4bb8844d6db0ded195291255953cb653481a94a05a8aa6f11d47439adf3ca380cdaefb5cecbd76e671feca1ef63faeba6439289feaa
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Blocker.lkck-424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722.exe
Filesize268KB
MD5655fdbe7e4479a0c24337b43b42802e1
SHA11864e771ea50ff21a902e5d41b0b6fb874ff93d5
SHA256424f862a0d5cb2b2b35e022975e2c9cb230bec782a9e5e5dc92620a833092722
SHA51288d45f2f576d2e71ffe6297cb39613dead09746c04c546f1b1ae07b25b1c26e84334a8c10dc1dae30bbe13a22d9c4382020858c93ebc0f1b9019f8bf1814e02f
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Crusis.db-eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894.exe
Filesize239KB
MD5a096f8fe56b435e45e83b2459ef4a472
SHA13f56c3cb7013ffac50d4b9476a08ef1c084f4b51
SHA256eada88d53aa9f0aec512dc59ff9fa87f2dcb8a84d9206891b001c80767d37894
SHA51281ba9a6050d9a3c946c5d9e6092c6d2aa93699d7f4143578d96d2b6b7436402dc29ee59728b008a9b950fc2976c14a0ab557b3b4d57d6df9c88cd200b709fd46
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.ggaf-eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379.exe
Filesize96KB
MD5bf6d27b4012a3382277140b35947725d
SHA163af0f83ec02eb6f2eefa96200c1050abc97a572
SHA256eb6a6e1197799c5108b8240aa5dc7b7692bcfcf8752c0235b045a5bbe1b08379
SHA5128f0270a6b80b5a1f31cdd87af0d570bf4d5bc36049c7d41edc97d4ab65f20c01de692e7e33fe69ff44020095af60432e4811c857182f06db035f1cc1ebbbbe13
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.lepb-b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78.exe
Filesize1.1MB
MD57681ae3933f3e13eb8e2a9be281a5763
SHA17224dc07c628d80cca6f6a8bbf2a05d14ce6e0c9
SHA256b794d480bcba30de53a25f9f47f678c0055e124a2f9fcdddab64962c4b3b3f78
SHA512dc47c995a0e19f610488451cf020f9f3f1286289a090a6ce64a9110ccb8e46a2535d05667a16e9b4c4a87b7e8230d441c1da19edeb6f1a922fcb8b082de4c539
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Foreign.ljru-1a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430.exe
Filesize142KB
MD5cadc18458043d0abfe75a08d4b5b7c58
SHA1cbe95919c20bf0aa6182297414caa299c19da065
SHA2561a97659f0cf65b12aa79057c996b36d5d6eb637419b6cc440dd9a873241ec430
SHA512799fd99558f2dd7321451f73a58bf46b57cb5a75d56726968aba7ece743e08d117215344c86573ef8ed40e0f0fb5f7b1cbfcc8073a6744936f42b89c96859567
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.bil-73536ed3a05e8c229892a66694ced4dabff9099eecdcb6a85cf6c5d0da17d2df.exe
Filesize244KB
MD5b49fe37909dc809a26866b728c48eeba
SHA1c6471a6b3da19ccee195c06f537615c9a039a135
SHA25673536ed3a05e8c229892a66694ced4dabff9099eecdcb6a85cf6c5d0da17d2df
SHA512e7bab1a0acb4e8ced161bc06962411e608ebaeca2f5d0ef970ae46a86d54054dc5b8d0646246d3e04e9f884110bc825f0b7c976129b318fced3364ea8a291851
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.bwi-346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064.exe
Filesize229KB
MD58ec0b7cb7a0a84e29e4bed2246432a46
SHA12ae1a7d6ee8fa4a7cdc06f30fc72e91f83e7bbd3
SHA256346dccd5b94216d9a56eecf4180a1c4f4516c145cd8f2888c6c059dbe4918064
SHA512dd40e345d2dd0ad866aaeee954a697f83a5642a6701325b623b4108a4f4d5e73a6cf0479a9921858884657d844dc94d3147b7ddd199b7042e0e28c8c982960b6
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xar-2b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261.exe
Filesize365KB
MD55a2126837e077677b5082d48e1adc668
SHA1ed62c0369e3dc2a95798f68a18318af9db40288a
SHA2562b18841837f09593a19ea7283eb99ae4405b9f30478a0e62b24f16fb5164e261
SHA5120bfaa56114f820590adb1a487dbc9a7b9650110cd83270c1ff09341f07ea52a84e203cda0384b6333c96c68b1bbc4caf424873b92a1c2d979b351aefa85af27d
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xhb-522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac.exe
Filesize403KB
MD5392432195a20e9b50dc63427b9d45ba4
SHA1b72dc0758030e6245e0fae46f2e21e6ea2f0839b
SHA256522e36e441c5243d646523bced63ef15b5e2209b9d05d231621dfe7a1b2266ac
SHA51293e72acc99d3f144d136a55a6e2eca445d04ed730592c071e66fa0b4bd3fa12aba867e36e0c326ebbee3cad9ce7429718869357f9201abf1ebd96e513101ba4c
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xjn-3df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef.exe
Filesize331KB
MD5ceb1aa2805aeb28555af92aa2494d80f
SHA1a4632e19d75e534f5eb4e65f3860d2c477d6bc40
SHA2563df7e9af468531fe085592a4b84191733c8c99af443f302611627a0752c312ef
SHA512a5be0a31d5cd81c11ca69c283b9a428b5f83db5a982f6b1c4c3acbf9d34bc163007cb6c02756f6b2ab36d83f5f41f6f4db38e13a172d61466b518bb983ef6973
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xlj-ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e.exe
Filesize323KB
MD5fe8c1cf2dd38f0a55e71398046f1d4ad
SHA1839deba5c756eaf18b19637685debd6f7a18f9fa
SHA256ca0651d2f6f875b97a1c49dcc85251290b06bb8dbc3a9f713e1fbf70adda6e5e
SHA512259eaef890ffee2d7d68401655af5cb43da1923df62dd906e91ecf12aa845c736cf46ac91a903cf68df63e2e27ecd3dca15f65ad6208216c5f58ae02c753894f
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Locky.xmh-c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322.exe
Filesize395KB
MD5300cde4a614b761274c17f6cabbe0f0f
SHA1b636939f30b52880cd840f50dc35ff493bc30db5
SHA256c7bffc634ef8329353660e0b8047c66c8d0c2e2d962a2efda82ee79066a2c322
SHA51267e6c86df7832aba7bd5db0249c1154c44b65a51398ad15db8865d8c04b465650dc3c1765a45951487947870d4c085dcda3dc15e2d1d279d0a2bbcc33b81bccd
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.PetrWrap.a-40f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee.exe
Filesize259KB
MD5fd2ea9e167d2125f1bd2f550e2a31ff4
SHA1ffdf9c4130b11bf34b6eddf58edb3c92642671e2
SHA25640f67626b9e6beeb5affbb07b7fa7b38a643d5eb0a04429c4423062c9510c7ee
SHA512c11f5089761928292aa6619231f80e6a7fcd0cb1f6e8c641c1ea60e9d9c7fb0ba679c0a05c0e210e4586159971c5ea9d132946bd3c500e3a68abe74c20087166
-
C:\Users\Admin\Desktop\00280\Trojan-Ransom.Win32.Shade.yd-412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03.exe
Filesize280KB
MD5bda707c516b67acc923980841e71867d
SHA19dd2ae6d25d7ecd85d02775d505f6ff285309af1
SHA256412b8e2ab83e55f1f477490b4ea78e03f87be221eb4a636584a80a636a9b1b03
SHA5129b8f5f09840b1658e0e78d47bbeb17f76ec6581f238c5ae15ad425d58af7ff3397863428fb14bb44403204a64bb625e5ceeefdceaa8739a757dbbe505b199fb9
-
Filesize
74KB
MD520d8a36932ac84c28f1821918b3b0f74
SHA1af83a9c43e52e2b8baaab5067ea4eb8ac416ba92
SHA25657f05df0a285fcc027439fac5d9e8654555e2824ba0e97bb1a57e264f6636dfb
SHA512a20e5fdd836e8b88351f3e5ee75731c64338b935c38560533839648495946ca5e8a912937d174d615060c7ac6ec6b2a327d0d30039a027b62885bba25fd3c323
-
Filesize
9KB
MD5ae6ac20d28684a7708cffc26b1ada4e0
SHA153f1c45b185d75131cf18007e727a9a2b076c1ee
SHA256dedcca15164d83b455cdb8d38f5820dde7bd4f81dd61171d2c06b12526818dac
SHA512188355508118e2d41757fb184775c60d92a9706f91cefd5c1f8558c9436bb23d1b48557016e15aad3955d23efe54589928e4a6a6d5692236e20b28592ec7ed55
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706