Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
PolyRansom.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
PolyRansom.exe
Resource
win10v2004-20241007-en
General
-
Target
PolyRansom.exe
-
Size
220KB
-
MD5
3ed3fb296a477156bc51aba43d825fc0
-
SHA1
9caa5c658b1a88fee149893d3a00b34a8bb8a1a6
-
SHA256
1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423
-
SHA512
dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e
-
SSDEEP
3072:EJv/3Ppzq+M4Lh5VWK5qlYRV+hvuFiweXXbGgL90v5mq33Z3:8hzEA5GlYMWFBeXvx0c+3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dwwEYEgc.exe -
Executes dropped EXE 2 IoCs
pid Process 4056 dwwEYEgc.exe 2044 ZKQYsIsc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwwEYEgc.exe = "C:\\Users\\Admin\\qUMsgIMc\\dwwEYEgc.exe" PolyRansom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ZKQYsIsc.exe = "C:\\ProgramData\\zgIQQoEY\\ZKQYsIsc.exe" PolyRansom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwwEYEgc.exe = "C:\\Users\\Admin\\qUMsgIMc\\dwwEYEgc.exe" dwwEYEgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ZKQYsIsc.exe = "C:\\ProgramData\\zgIQQoEY\\ZKQYsIsc.exe" ZKQYsIsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PolyRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4928 reg.exe 4792 reg.exe 3120 reg.exe 4012 reg.exe 2272 reg.exe 1848 reg.exe 392 reg.exe 2336 reg.exe 636 reg.exe 4532 reg.exe 3800 reg.exe 3776 reg.exe 2096 reg.exe 5028 reg.exe 2884 reg.exe 2216 reg.exe 1680 reg.exe 3740 reg.exe 948 reg.exe 744 reg.exe 3896 reg.exe 2956 reg.exe 328 reg.exe 5032 reg.exe 2808 reg.exe 1608 reg.exe 3228 reg.exe 1560 reg.exe 2352 reg.exe 392 reg.exe 3792 reg.exe 3668 reg.exe 3028 reg.exe 2032 reg.exe 2972 reg.exe 3548 reg.exe 1944 reg.exe 4152 reg.exe 4496 reg.exe 2856 reg.exe 5116 reg.exe 2160 reg.exe 2296 reg.exe 5032 reg.exe 4076 reg.exe 2204 reg.exe 5056 reg.exe 2308 reg.exe 3972 reg.exe 1740 reg.exe 2336 reg.exe 2528 reg.exe 2368 reg.exe 3844 reg.exe 4996 reg.exe 5112 reg.exe 3132 reg.exe 5008 reg.exe 1696 reg.exe 1428 reg.exe 328 reg.exe 1552 reg.exe 548 reg.exe 3308 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 PolyRansom.exe 516 PolyRansom.exe 516 PolyRansom.exe 516 PolyRansom.exe 1520 PolyRansom.exe 1520 PolyRansom.exe 1520 PolyRansom.exe 1520 PolyRansom.exe 2828 PolyRansom.exe 2828 PolyRansom.exe 2828 PolyRansom.exe 2828 PolyRansom.exe 800 PolyRansom.exe 800 PolyRansom.exe 800 PolyRansom.exe 800 PolyRansom.exe 4524 PolyRansom.exe 4524 PolyRansom.exe 4524 PolyRansom.exe 4524 PolyRansom.exe 392 PolyRansom.exe 392 PolyRansom.exe 392 PolyRansom.exe 392 PolyRansom.exe 540 PolyRansom.exe 540 PolyRansom.exe 540 PolyRansom.exe 540 PolyRansom.exe 2036 PolyRansom.exe 2036 PolyRansom.exe 2036 PolyRansom.exe 2036 PolyRansom.exe 3892 PolyRansom.exe 3892 PolyRansom.exe 3892 PolyRansom.exe 3892 PolyRansom.exe 3748 PolyRansom.exe 3748 PolyRansom.exe 3748 PolyRansom.exe 3748 PolyRansom.exe 1824 PolyRansom.exe 1824 PolyRansom.exe 1824 PolyRansom.exe 1824 PolyRansom.exe 3944 PolyRansom.exe 3944 PolyRansom.exe 3944 PolyRansom.exe 3944 PolyRansom.exe 1272 PolyRansom.exe 1272 PolyRansom.exe 1272 PolyRansom.exe 1272 PolyRansom.exe 5068 PolyRansom.exe 5068 PolyRansom.exe 5068 PolyRansom.exe 5068 PolyRansom.exe 5024 PolyRansom.exe 5024 PolyRansom.exe 5024 PolyRansom.exe 5024 PolyRansom.exe 3020 PolyRansom.exe 3020 PolyRansom.exe 3020 PolyRansom.exe 3020 PolyRansom.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4056 dwwEYEgc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe 4056 dwwEYEgc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 4056 516 PolyRansom.exe 84 PID 516 wrote to memory of 4056 516 PolyRansom.exe 84 PID 516 wrote to memory of 4056 516 PolyRansom.exe 84 PID 516 wrote to memory of 2044 516 PolyRansom.exe 85 PID 516 wrote to memory of 2044 516 PolyRansom.exe 85 PID 516 wrote to memory of 2044 516 PolyRansom.exe 85 PID 516 wrote to memory of 2360 516 PolyRansom.exe 86 PID 516 wrote to memory of 2360 516 PolyRansom.exe 86 PID 516 wrote to memory of 2360 516 PolyRansom.exe 86 PID 516 wrote to memory of 3896 516 PolyRansom.exe 87 PID 516 wrote to memory of 3896 516 PolyRansom.exe 87 PID 516 wrote to memory of 3896 516 PolyRansom.exe 87 PID 516 wrote to memory of 4904 516 PolyRansom.exe 88 PID 516 wrote to memory of 4904 516 PolyRansom.exe 88 PID 516 wrote to memory of 4904 516 PolyRansom.exe 88 PID 516 wrote to memory of 3272 516 PolyRansom.exe 89 PID 516 wrote to memory of 3272 516 PolyRansom.exe 89 PID 516 wrote to memory of 3272 516 PolyRansom.exe 89 PID 516 wrote to memory of 1256 516 PolyRansom.exe 90 PID 516 wrote to memory of 1256 516 PolyRansom.exe 90 PID 516 wrote to memory of 1256 516 PolyRansom.exe 90 PID 1256 wrote to memory of 2564 1256 cmd.exe 96 PID 1256 wrote to memory of 2564 1256 cmd.exe 96 PID 1256 wrote to memory of 2564 1256 cmd.exe 96 PID 2360 wrote to memory of 1520 2360 cmd.exe 98 PID 2360 wrote to memory of 1520 2360 cmd.exe 98 PID 2360 wrote to memory of 1520 2360 cmd.exe 98 PID 1520 wrote to memory of 3668 1520 PolyRansom.exe 99 PID 1520 wrote to memory of 3668 1520 PolyRansom.exe 99 PID 1520 wrote to memory of 3668 1520 PolyRansom.exe 99 PID 1520 wrote to memory of 2376 1520 PolyRansom.exe 101 PID 1520 wrote to memory of 2376 1520 PolyRansom.exe 101 PID 1520 wrote to memory of 2376 1520 PolyRansom.exe 101 PID 1520 wrote to memory of 4312 1520 PolyRansom.exe 102 PID 1520 wrote to memory of 4312 1520 PolyRansom.exe 102 PID 1520 wrote to memory of 4312 1520 PolyRansom.exe 102 PID 1520 wrote to memory of 1816 1520 PolyRansom.exe 103 PID 1520 wrote to memory of 1816 1520 PolyRansom.exe 103 PID 1520 wrote to memory of 1816 1520 PolyRansom.exe 103 PID 1520 wrote to memory of 2036 1520 PolyRansom.exe 104 PID 1520 wrote to memory of 2036 1520 PolyRansom.exe 104 PID 1520 wrote to memory of 2036 1520 PolyRansom.exe 104 PID 3668 wrote to memory of 2828 3668 cmd.exe 109 PID 3668 wrote to memory of 2828 3668 cmd.exe 109 PID 3668 wrote to memory of 2828 3668 cmd.exe 109 PID 2036 wrote to memory of 4832 2036 cmd.exe 110 PID 2036 wrote to memory of 4832 2036 cmd.exe 110 PID 2036 wrote to memory of 4832 2036 cmd.exe 110 PID 2828 wrote to memory of 4580 2828 PolyRansom.exe 111 PID 2828 wrote to memory of 4580 2828 PolyRansom.exe 111 PID 2828 wrote to memory of 4580 2828 PolyRansom.exe 111 PID 4580 wrote to memory of 800 4580 cmd.exe 113 PID 4580 wrote to memory of 800 4580 cmd.exe 113 PID 4580 wrote to memory of 800 4580 cmd.exe 113 PID 2828 wrote to memory of 4076 2828 PolyRansom.exe 114 PID 2828 wrote to memory of 4076 2828 PolyRansom.exe 114 PID 2828 wrote to memory of 4076 2828 PolyRansom.exe 114 PID 2828 wrote to memory of 2128 2828 PolyRansom.exe 115 PID 2828 wrote to memory of 2128 2828 PolyRansom.exe 115 PID 2828 wrote to memory of 2128 2828 PolyRansom.exe 115 PID 2828 wrote to memory of 2368 2828 PolyRansom.exe 116 PID 2828 wrote to memory of 2368 2828 PolyRansom.exe 116 PID 2828 wrote to memory of 2368 2828 PolyRansom.exe 116 PID 2828 wrote to memory of 1620 2828 PolyRansom.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exe"C:\Users\Admin\AppData\Local\Temp\PolyRansom.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\qUMsgIMc\dwwEYEgc.exe"C:\Users\Admin\qUMsgIMc\dwwEYEgc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4056
-
-
C:\ProgramData\zgIQQoEY\ZKQYsIsc.exe"C:\ProgramData\zgIQQoEY\ZKQYsIsc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"4⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"6⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom7⤵
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"8⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"10⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom11⤵
- Suspicious behavior: EnumeratesProcesses
PID:392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"12⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom13⤵
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"14⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"16⤵
- System Location Discovery: System Language Discovery
PID:832 -
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"18⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"20⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"22⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"24⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"26⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom27⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"28⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom29⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"30⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"32⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom33⤵PID:2036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"34⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom35⤵PID:2820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"36⤵PID:3332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom37⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"38⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom39⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"40⤵PID:1680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom41⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"42⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom43⤵
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"44⤵PID:1896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom45⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"46⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom47⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"48⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom49⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"50⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom51⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"52⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom53⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"54⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom55⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"56⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom57⤵PID:4144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"58⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom59⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"60⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom61⤵
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"62⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom63⤵PID:1852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"64⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom65⤵PID:2148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"66⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom67⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"68⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom69⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"70⤵PID:1696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom71⤵PID:2140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"72⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom73⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"74⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom75⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"76⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom77⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"78⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom79⤵PID:1420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"80⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom81⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"82⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom83⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"84⤵PID:328
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom85⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"86⤵PID:1500
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom87⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"88⤵PID:1140
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom89⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"90⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom91⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"92⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom93⤵PID:3088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"94⤵PID:3932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom95⤵PID:764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"96⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom97⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"98⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom99⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"100⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom101⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"102⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom103⤵PID:3972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"104⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom105⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"106⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom107⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"108⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom109⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"110⤵PID:2720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom111⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"112⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom113⤵
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"114⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom115⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"116⤵PID:1980
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom117⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"118⤵PID:4860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom119⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"120⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\PolyRansom.exeC:\Users\Admin\AppData\Local\Temp\PolyRansom121⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PolyRansom"122⤵PID:3572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-