Analysis
-
max time kernel
232s -
max time network
264s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00267.7z
Resource
win10v2004-20250217-en
General
-
Target
RNSM00267.7z
-
Size
13.2MB
-
MD5
5f3189f2d9671cc1effb61e909f5a331
-
SHA1
711a6e17e44e2e064fe949b9242217c6b9a9dcb4
-
SHA256
4a18db0e1412b7a0d521cac3cbe4c70be2e5f802175fc54ac1925140a765fa51
-
SHA512
3006b84be4bce9f404585cce712a4172e5c7a9928a424b82c86c9bb9a53defa9c46ce01d439adefe0afa6e1516a233d99821dba25c4ebfb6f01e0a62a802362f
-
SSDEEP
393216:g0fPRzH47pC2/+55Lch5v6JJpRy96LSKW:DfP+7ptMdc+JJC96LSB
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\restore_files_xyhek.txt
http://rtldkdh6.kghw88gh3eu.net/C1DF407750252A9
http://jsdf2wevw2.wrt23wqw34.net/C1DF407750252A9
https://7vhbukzxypxh3xfy.onion.to/C1DF407750252A9
http://7vhbukzxypxh3xfy.onion/C1DF407750252A9
Extracted
gozi
Extracted
C:\Program Files\7-Zip\Lang\Recovery+xangx.txt
teslacrypt
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/BB63E344C138CEDB
http://kkd47eh4hdjshb5t.angortra.at/BB63E344C138CEDB
http://ytrest84y5i456hghadefdsd.pontogrot.com/BB63E344C138CEDB
http://xlowfznrg4wf7dli.ONION/BB63E344C138CEDB
Extracted
C:\Users\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E1
http://cerberhhyed5frqa.xo59ok.win/3CBF-BA67-308C-0291-29E1
http://cerberhhyed5frqa.zx34jk.win/3CBF-BA67-308C-0291-29E1
http://cerberhhyed5frqa.rt4e34.win/3CBF-BA67-308C-0291-29E1
http://cerberhhyed5frqa.as13fd.win/3CBF-BA67-308C-0291-29E1
http://cerberhhyed5frqa.onion/3CBF-BA67-308C-0291-29E1
Extracted
C:\Users\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Gozi family
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Contacts a large (16429) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe -
Renames multiple (2734) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (883) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" verifiergui.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation verifiergui.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation service.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation service.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation vcwxqo.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation kubkyobqskdy.exe -
Drops startup file 21 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\verifiergui.lnk Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\restore_files_xyhek.txt kubkyobqskdy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+xangx.png kubkyobqskdy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+xangx.txt kubkyobqskdy.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\README.txt service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\verifiergui.lnk verifiergui.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\recovery+xangx.png taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\restore_files_xyhek.html taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\restore_files_xyhek.txt kubkyobqskdy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+xangx.txt kubkyobqskdy.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\restore_files_xyhek.txt.mp3 taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\restore_files_xyhek.txt vcwxqo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\restore_files_xyhek.html vcwxqo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+xangx.html kubkyobqskdy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+xangx.html kubkyobqskdy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+xangx.txt service.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\recovery+xangx.txt taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\restore_files_xyhek.html vcwxqo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\restore_files_xyhek.txt vcwxqo.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+xangx.png kubkyobqskdy.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\recovery+xangx.html taskmgr.exe -
Executes dropped EXE 47 IoCs
pid Process 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 4252 Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe 4088 Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe 816 Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe 1528 Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe 2200 Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe 5208 vcwxqo.exe 5988 Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe 4748 Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe 2884 service.exe 3584 Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe 5380 Trojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exe 320 Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe 3468 Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe 4716 explorer.exe 5176 Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe 4652 explorer.exe 1212 taskmgr.exe 5624 explorer.exe 4476 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 5920 Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe 3836 Trojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exe 4444 pythonw.exe 7908 Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe 7956 verifiergui.exe 7816 verifiergui.exe 7004 Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe 7256 kubkyobqskdy.exe 7404 verifiergui.exe 1156 verifiergui.exe 4872 verifiergui.exe 8188 verifiergui.exe 5460 verifiergui.exe 1628 Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe 8056 verifiergui.exe 6856 AppEmuid.exe 7668 kubkyobqskdy.exe 7332 service.exe 3648 service.exe 312 Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe 5140 service.exe 8120 verifiergui.exe 7048 verifiergui.exe 6972 verifiergui.exe 7528 verifiergui.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe -
Loads dropped DLL 24 IoCs
pid Process 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 4252 Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe 4252 Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe 4252 Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 3468 Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 5176 Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe 5176 Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe 5176 Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe 5176 Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe 5176 Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe 4444 pythonw.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe 960 Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\helper_xgcv = "C:\\Users\\Admin\\AppData\\Roaming\\vcwxqo.exe" vcwxqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\helper_xgcv = "C" vcwxqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\explorer.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Rutube = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rutube\\python\\pythonw.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\Rutube\\launcher.py\" 5000" Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek System Audio Handler = "C:\\Users\\Admin\\AppData\\Roaming\\BRAV64.exe" Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\verifiergui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\azrocdp = "C:\\Users\\Admin\\AppData\\Roaming\\batmview\\AppEmuid.exe" Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ipyqatal = "\"C:\\Windows\\agecipum.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\verifiergui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\verifiergui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" verifiergui.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\verifiergui = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" verifiergui.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chnpxgbrxnmn = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\kubkyobqskdy.exe\"" kubkyobqskdy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yrnbudus = "\"C:\\Windows\\ywihifyc.exe\"" Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4E81-0D35 = "C:\\Program Files (x86)\\service.exe" service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 102 www.iplocation.net 40 ipinfo.io 52 www.iplocation.net 56 www.iplocation.net 63 ipecho.net 68 ipinfo.io 80 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\desk1.bmp" service.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp4CD4.bmp" verifiergui.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4748 Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe 320 Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 1404 set thread context of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 4476 set thread context of 1824 4476 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 129 PID 5920 set thread context of 7908 5920 Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe 135 PID 7956 set thread context of 7816 7956 verifiergui.exe 141 PID 816 set thread context of 7004 816 Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe 142 PID 7404 set thread context of 4872 7404 verifiergui.exe 156 PID 4252 set thread context of 1628 4252 Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe 157 PID 1156 set thread context of 8188 1156 verifiergui.exe 158 PID 5460 set thread context of 8056 5460 verifiergui.exe 161 PID 7256 set thread context of 7668 7256 kubkyobqskdy.exe 165 PID 2884 set thread context of 7332 2884 service.exe 167 PID 6856 set thread context of 2088 6856 AppEmuid.exe 168 PID 4088 set thread context of 312 4088 Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe 175 PID 2088 set thread context of 3508 2088 svchost.exe 56 PID 3508 set thread context of 4932 3508 Explorer.EXE 176 PID 3508 set thread context of 4052 3508 Explorer.EXE 60 PID 3508 set thread context of 4212 3508 Explorer.EXE 62 PID 3508 set thread context of 4440 3508 Explorer.EXE 64 PID 3508 set thread context of 1216 3508 Explorer.EXE 77 PID 3508 set thread context of 4544 3508 Explorer.EXE 78 PID 3648 set thread context of 5140 3648 service.exe 177 PID 8120 set thread context of 7048 8120 verifiergui.exe 207 PID 6972 set thread context of 7528 6972 verifiergui.exe 238 PID 3508 set thread context of 7424 3508 Explorer.EXE 244 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\README.txt service.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNotebookWideTile.scale-150.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionLargeTile.scale-200.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionWideTile.scale-100.png vcwxqo.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\restore_files_xyhek.txt kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\AgentPlaceholder.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\BadgeLogo.scale-200.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\is-IS\Recovery+xangx.txt kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xee27.png kubkyobqskdy.exe File opened for modification C:\Program Files\Recovery+xangx.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\microsoft-logo-color.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreAppList.scale-200.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-32_altform-unplated_contrast-white.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\PhotosApp\Assets\Recovery+xangx.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-30_altform-lightunplated.png kubkyobqskdy.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\restore_files_xyhek.html vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\Recovery+xangx.html kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\Assets\Settings-Black.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteAppList.targetsize-48.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\x86\Recovery+xangx.html kubkyobqskdy.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\README.txt service.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\restore_files_xyhek.html vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeAppList.scale-200.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_altform-unplated_contrast-white.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-125_contrast-white.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\Recovery+xangx.html kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_2.m4a kubkyobqskdy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.scale-140.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\restore_files_xyhek.txt vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsLargeTile.scale-125.png kubkyobqskdy.exe File created C:\Program Files\dotnet\README.txt service.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\Recovery+xangx.txt kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Recovery+xangx.html kubkyobqskdy.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\Recovery+xangx.txt service.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\restore_files_xyhek.html vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteMedTile.scale-150.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\commerce\call_failure_illustration.png kubkyobqskdy.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-gb\README.txt service.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\da-dk\README.txt service.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pl-pl\README.txt service.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\restore_files_xyhek.txt vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Notification_AppLogo_PowerStatus.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\Recovery+xangx.txt kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Recovery+xangx.txt kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-32_altform-unplated.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Programmer.targetsize-64_contrast-white.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyCalendarSearch-Dark.scale-400.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\restore_files_xyhek.html vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\MedTile.scale-400.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\AdCloseButton.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\WideTile.scale-100.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-32_contrast-black.png vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\Recovery+xangx.html kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\Recovery+xangx.txt kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SmallTile.scale-200_contrast-white.png kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-white\WideTile.scale-125.png vcwxqo.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\Recovery+xangx.txt service.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\restore_files_xyhek.html vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\microsoft.system.package.metadata\restore_files_xyhek.txt vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-24_altform-unplated_contrast-white.png vcwxqo.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\Recovery+xangx.png kubkyobqskdy.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\PCHEALTH\ERRORREP\QHEADLES\restore_files_xyhek.txt vcwxqo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\Recovery+xangx.txt kubkyobqskdy.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\Recovery+xangx.txt kubkyobqskdy.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\setupact.log Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe File opened for modification C:\Windows\setuperr.log Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe File created C:\Windows\agecipum.exe explorer.exe File created C:\Windows\kubkyobqskdy.exe Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe File opened for modification C:\Windows\kubkyobqskdy.exe Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe File opened for modification C:\Windows\setupact.log AppEmuid.exe File opened for modification C:\Windows\setuperr.log AppEmuid.exe File opened for modification C:\Windows\ywihifyc.exe Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe File opened for modification C:\Windows\agecipum.exe explorer.exe File created C:\Windows\ywihifyc.exe Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3628 4748 WerFault.exe 107 7792 3836 WerFault.exe 131 -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifiergui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifiergui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kubkyobqskdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifiergui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifiergui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kubkyobqskdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifiergui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pythonw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcwxqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifiergui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language verifiergui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppEmuid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7980 cmd.exe 7500 PING.EXE 8020 cmd.exe 4156 PING.EXE -
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x000a000000023d2f-35.dat nsis_installer_1 behavioral1/files/0x000a000000023d2f-35.dat nsis_installer_2 behavioral1/files/0x0007000000023d3c-37.dat nsis_installer_1 behavioral1/files/0x0007000000023d3c-37.dat nsis_installer_2 behavioral1/files/0x0007000000023d3d-41.dat nsis_installer_1 behavioral1/files/0x0007000000023d3d-41.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName AppEmuid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 AppEmuid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 3 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5556 vssadmin.exe 7056 vssadmin.exe 6228 vssadmin.exe 7704 vssadmin.exe 7828 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 7024 taskkill.exe 7020 taskkill.exe -
Modifies Control Panel 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop verifiergui.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\\verifiergui.exe\"" verifiergui.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop service.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop\ service.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop\TileWallpaper = "0" service.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Internet Explorer\PhishingFilter explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Internet Explorer\PhishingFilter Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Explorer.EXE -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings verifiergui.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings kubkyobqskdy.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "3" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0000000001000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e80922b16d365937a46956b92703aca08af0000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings vcwxqo.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Documents" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Explorer.EXE -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 6460 NOTEPAD.EXE 1748 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 7500 PING.EXE 4156 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3508 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 320 Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe 320 Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 2200 Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe 2200 Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 4716 explorer.exe 4716 explorer.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe 5208 vcwxqo.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1792 7zFM.exe 3508 Explorer.EXE 7424 taskmgr.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 6856 AppEmuid.exe 2088 svchost.exe 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 6780 msedge.exe 6780 msedge.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5208 vcwxqo.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1792 7zFM.exe Token: 35 1792 7zFM.exe Token: SeSecurityPrivilege 1792 7zFM.exe Token: SeDebugPrivilege 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe Token: SeDebugPrivilege 2200 Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe Token: SeDebugPrivilege 5208 vcwxqo.exe Token: SeBackupPrivilege 5560 vssvc.exe Token: SeRestorePrivilege 5560 vssvc.exe Token: SeAuditPrivilege 5560 vssvc.exe Token: SeDebugPrivilege 4716 explorer.exe Token: SeBackupPrivilege 4388 dw20.exe Token: SeBackupPrivilege 4388 dw20.exe Token: SeDebugPrivilege 7908 Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe Token: SeDebugPrivilege 7816 verifiergui.exe Token: SeDebugPrivilege 7004 Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe Token: SeDebugPrivilege 7024 taskkill.exe Token: SeIncreaseQuotaPrivilege 4936 wmic.exe Token: SeSecurityPrivilege 4936 wmic.exe Token: SeTakeOwnershipPrivilege 4936 wmic.exe Token: SeLoadDriverPrivilege 4936 wmic.exe Token: SeSystemProfilePrivilege 4936 wmic.exe Token: SeSystemtimePrivilege 4936 wmic.exe Token: SeProfSingleProcessPrivilege 4936 wmic.exe Token: SeIncBasePriorityPrivilege 4936 wmic.exe Token: SeCreatePagefilePrivilege 4936 wmic.exe Token: SeBackupPrivilege 4936 wmic.exe Token: SeRestorePrivilege 4936 wmic.exe Token: SeShutdownPrivilege 4936 wmic.exe Token: SeDebugPrivilege 4936 wmic.exe Token: SeSystemEnvironmentPrivilege 4936 wmic.exe Token: SeRemoteShutdownPrivilege 4936 wmic.exe Token: SeUndockPrivilege 4936 wmic.exe Token: SeManageVolumePrivilege 4936 wmic.exe Token: 33 4936 wmic.exe Token: 34 4936 wmic.exe Token: 35 4936 wmic.exe Token: 36 4936 wmic.exe Token: SeIncreaseQuotaPrivilege 4936 wmic.exe Token: SeSecurityPrivilege 4936 wmic.exe Token: SeTakeOwnershipPrivilege 4936 wmic.exe Token: SeLoadDriverPrivilege 4936 wmic.exe Token: SeSystemProfilePrivilege 4936 wmic.exe Token: SeSystemtimePrivilege 4936 wmic.exe Token: SeProfSingleProcessPrivilege 4936 wmic.exe Token: SeIncBasePriorityPrivilege 4936 wmic.exe Token: SeCreatePagefilePrivilege 4936 wmic.exe Token: SeBackupPrivilege 4936 wmic.exe Token: SeRestorePrivilege 4936 wmic.exe Token: SeShutdownPrivilege 4936 wmic.exe Token: SeDebugPrivilege 4936 wmic.exe Token: SeSystemEnvironmentPrivilege 4936 wmic.exe Token: SeRemoteShutdownPrivilege 4936 wmic.exe Token: SeUndockPrivilege 4936 wmic.exe Token: SeManageVolumePrivilege 4936 wmic.exe Token: 33 4936 wmic.exe Token: 34 4936 wmic.exe Token: 35 4936 wmic.exe Token: 36 4936 wmic.exe Token: SeDebugPrivilege 4872 verifiergui.exe Token: SeDebugPrivilege 8188 verifiergui.exe Token: SeDebugPrivilege 8056 verifiergui.exe Token: SeDebugPrivilege 5888 taskmgr.exe Token: SeSystemProfilePrivilege 5888 taskmgr.exe Token: SeCreateGlobalPrivilege 5888 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1792 7zFM.exe 1792 7zFM.exe 3584 Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe 6856 AppEmuid.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3584 Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe 6856 AppEmuid.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 6328 taskmgr.exe 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 320 Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe 5920 Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe 7956 verifiergui.exe 7404 verifiergui.exe 1156 verifiergui.exe 5460 verifiergui.exe 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 8120 verifiergui.exe 3508 Explorer.EXE 3508 Explorer.EXE 6972 verifiergui.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 1404 3160 cmd.exe 95 PID 3160 wrote to memory of 1404 3160 cmd.exe 95 PID 3160 wrote to memory of 1404 3160 cmd.exe 95 PID 3160 wrote to memory of 960 3160 cmd.exe 96 PID 3160 wrote to memory of 960 3160 cmd.exe 96 PID 3160 wrote to memory of 960 3160 cmd.exe 96 PID 3160 wrote to memory of 4252 3160 cmd.exe 97 PID 3160 wrote to memory of 4252 3160 cmd.exe 97 PID 3160 wrote to memory of 4252 3160 cmd.exe 97 PID 3160 wrote to memory of 4088 3160 cmd.exe 98 PID 3160 wrote to memory of 4088 3160 cmd.exe 98 PID 3160 wrote to memory of 4088 3160 cmd.exe 98 PID 3160 wrote to memory of 468 3160 cmd.exe 99 PID 3160 wrote to memory of 468 3160 cmd.exe 99 PID 3160 wrote to memory of 468 3160 cmd.exe 99 PID 3160 wrote to memory of 816 3160 cmd.exe 100 PID 3160 wrote to memory of 816 3160 cmd.exe 100 PID 3160 wrote to memory of 816 3160 cmd.exe 100 PID 3160 wrote to memory of 1528 3160 cmd.exe 101 PID 3160 wrote to memory of 1528 3160 cmd.exe 101 PID 3160 wrote to memory of 1528 3160 cmd.exe 101 PID 3160 wrote to memory of 2200 3160 cmd.exe 102 PID 3160 wrote to memory of 2200 3160 cmd.exe 102 PID 3160 wrote to memory of 2200 3160 cmd.exe 102 PID 468 wrote to memory of 5208 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe 103 PID 468 wrote to memory of 5208 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe 103 PID 468 wrote to memory of 5208 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe 103 PID 3160 wrote to memory of 5988 3160 cmd.exe 104 PID 3160 wrote to memory of 5988 3160 cmd.exe 104 PID 3160 wrote to memory of 5988 3160 cmd.exe 104 PID 468 wrote to memory of 3996 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe 105 PID 468 wrote to memory of 3996 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe 105 PID 468 wrote to memory of 3996 468 Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe 105 PID 3160 wrote to memory of 4748 3160 cmd.exe 107 PID 3160 wrote to memory of 4748 3160 cmd.exe 107 PID 3160 wrote to memory of 4748 3160 cmd.exe 107 PID 5988 wrote to memory of 2884 5988 Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe 108 PID 5988 wrote to memory of 2884 5988 Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe 108 PID 5988 wrote to memory of 2884 5988 Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe 108 PID 3160 wrote to memory of 3584 3160 cmd.exe 110 PID 3160 wrote to memory of 3584 3160 cmd.exe 110 PID 3160 wrote to memory of 3584 3160 cmd.exe 110 PID 5208 wrote to memory of 5556 5208 vcwxqo.exe 112 PID 5208 wrote to memory of 5556 5208 vcwxqo.exe 112 PID 3160 wrote to memory of 5380 3160 cmd.exe 114 PID 3160 wrote to memory of 5380 3160 cmd.exe 114 PID 3160 wrote to memory of 5380 3160 cmd.exe 114 PID 3160 wrote to memory of 320 3160 cmd.exe 115 PID 3160 wrote to memory of 320 3160 cmd.exe 115 PID 3160 wrote to memory of 320 3160 cmd.exe 115 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 1404 wrote to memory of 4476 1404 Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe 118 PID 3160 wrote to memory of 3468 3160 cmd.exe 122 PID 3160 wrote to memory of 3468 3160 cmd.exe 122 PID 3160 wrote to memory of 3468 3160 cmd.exe 122 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vcwxqo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" vcwxqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System kubkyobqskdy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" kubkyobqskdy.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3508 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00267.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1792
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exeTrojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exeTrojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"5⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
PID:1824 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet6⤵
- Interacts with shadow copies
PID:6228
-
-
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exeTrojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:960 -
C:\Users\Admin\AppData\Roaming\Rutube\python\pythonw.exe"C:\Users\Admin\AppData\Roaming\Rutube\python\pythonw.exe" "C:\Users\Admin\AppData\Roaming\Rutube\launcher.py" 288000004⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exeTrojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exeTrojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
PID:1628 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
PID:7704
-
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exeTrojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe"C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:312
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exeTrojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Roaming\vcwxqo.exeC:\Users\Admin\AppData\Roaming\vcwxqo.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5208 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet5⤵
- Interacts with shadow copies
PID:5556
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:6460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RESTORE_FILES.HTML5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f47186⤵PID:6440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:26⤵PID:7356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:36⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:86⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:16⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:16⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:86⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:86⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:16⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:16⤵PID:7388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:16⤵PID:7764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:16⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:16⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:16⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:16⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1002056045642195495,14326971963806702198,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:16⤵PID:6304
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet5⤵
- Interacts with shadow copies
PID:7828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\vcwxqo.exe >> NUL5⤵
- System Location Discovery: System Language Discovery
PID:7520 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:8120 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"7⤵
- Executes dropped EXE
PID:7048
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\Desktop\00268\TR4C0D~1.EXE >> NUL4⤵
- System Location Discovery: System Language Discovery
PID:3996
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exeTrojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:816 -
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exeTrojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7004 -
C:\Windows\kubkyobqskdy.exeC:\Windows\kubkyobqskdy.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7256 -
C:\Windows\kubkyobqskdy.exeC:\Windows\kubkyobqskdy.exe6⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:7668 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive7⤵PID:7468
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT7⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM7⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f47188⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:28⤵PID:6624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:38⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:88⤵PID:6612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:18⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10199555960520990209,15182328216820311529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:18⤵PID:1940
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive7⤵PID:5804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\KUBKYO~1.EXE7⤵
- System Location Discovery: System Language Discovery
PID:7692 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6972 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"9⤵
- Executes dropped EXE
PID:7528
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00268\TR539E~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:7384 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:8188
-
-
-
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exeTrojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9166⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\taskmgr.exe"5⤵
- Executes dropped EXE
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5624
-
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exeTrojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exeTrojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5988 -
C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe"C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe"C:\Program Files (x86)\Compressed data archive\Info o dogovore\service.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7332 -
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"7⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:5140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IQGIA.bat" "8⤵PID:8076
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exeTrojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 4844⤵
- Program crash
PID:3628
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exeTrojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BDBE\5EDF.bat" "C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe" "C:\Users\Admin\Desktop\00268\TRA5DC~1.EXE""4⤵
- System Location Discovery: System Language Discovery
PID:6876 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7404 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe" "C:\Users\Admin\Desktop\00268\TRA5DC~1.EXE""5⤵
- System Location Discovery: System Language Discovery
PID:5632 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5460 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:8056
-
-
-
C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe"C:\Users\Admin\AppData\Roaming\batmview\AppEmuid.exe" "C:\Users\Admin\Desktop\00268\TRA5DC~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6856 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2088
-
-
-
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exeTrojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5380
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exeTrojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exeTrojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exeTrojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5176
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exeTrojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5920 -
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exeTrojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe4⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:7908 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7956 -
C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe"6⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7816 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:7056
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete7⤵
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html7⤵PID:5864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f47188⤵PID:1128
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt7⤵PID:7348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.6oifgr.win/3CBF-BA67-308C-0291-29E17⤵PID:6736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb09f46f8,0x7ffbb09f4708,0x7ffbb09f47188⤵PID:6020
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"7⤵PID:3000
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "verifiergui.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{198338F6-D565-5635-AD02-80CEA4DFDCE7}\verifiergui.exe" > NUL7⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8020 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "verifiergui.exe"8⤵
- Kills process with taskkill
PID:7020
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4156
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe" > NUL5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:7980 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe"6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7024
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.16⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7500
-
-
-
-
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exeTrojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 2404⤵
- Program crash
PID:7792
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5888
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6328
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵PID:4932
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
PID:7424
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\RECOVERY.png" /ForceBootstrapPaint3D2⤵PID:2852
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4052
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4212
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:1216
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4544
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:5592
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4748 -ip 47481⤵PID:6004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3836 -ip 38361⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7352
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x30c 0x2441⤵PID:5856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵PID:5280
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:7276
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Peripheral Device Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101B
MD532d027cbc79f0ca8a00137735910608c
SHA175ca897c8a90fbb82aa287b32e31bffa6c5db9f7
SHA256a53da51349ca3a073b76b5daecb03bc6d81ccf250b11c3772c9c69f3563a42bb
SHA5120005862023794ad6979058f3d8a7d234b0b05e5eef5cc829d0e74b0b5b2fe3747e13b34d68333b13ae32b9e1655aca9a5ce5afba797fe3117ab57308750ae1e0
-
Filesize
2KB
MD51f8dfc1cc8b19a64a0367b7d4626cb15
SHA1abe4fce46a1e177e1c06d621638e6d547c1cc28d
SHA256a6bf4025bd90bdf5421528da34593cbe7ab625fc25b07fef43da95cadfb3d15f
SHA5129307bfe13aa8537d0809035f523a1c67e72f7a81c159accad295c25216a1db312b93dec5425437c5b7ee30bc82e844010383fffcb90c95ba09cd9d9aac5e6c17
-
Filesize
319KB
MD56381adb801d76d076b3ad4b55e3b4757
SHA1b1cbbb309ec24fa075dc90c66057cb77dfa5bb4f
SHA256ad2c8e4a1d5ee164d06db4a516163c3ec90654b3658480ccc39542d1f4b9ed60
SHA512de350e86c73ed6c2efb7b77e03d19f998c63014bf1e75d2cbd5e14422ceb18dc8c3a22b35f88706a2ae88cb4203b72c38563d723012c72631adf9bcd373d657e
-
Filesize
9KB
MD5b7e48c9b9cadd54df7c77ff512ea52b6
SHA19ae9208ea874790b8cd09d212791f02ac3454916
SHA25676ff611cc007723d179356ac426160863a74610818203b8fdb7ac1ca7a952c8c
SHA512c779a756a0e9d9655a14ff883bc54df68938d31ccf814a958b71fdcc685e3cfee679684c08b4f34a28d422fde7d81b943e9b8fd5ace8e4895bfcd9fbb4f2e425
-
Filesize
63KB
MD5889a18e779a123badc56183e2ca93e9e
SHA1c8e182ff03bcfd7544bc908d28f1fe537b37f09e
SHA25676155b561a3a46c695fd192c7555eec1ba097da69bd4d9d8b874cff9c44232ac
SHA512fc41dbf9daa54ee72cb570e6aa75de73453df2d2c43b08f22f404052abfd8ef688c89dc4da03fe19483ec7d1a36475e7e69a3e2e05bbf8ea9f8da0dd899302ab
-
Filesize
1KB
MD531c123567fd0e3e3d7fcc2500326e505
SHA16d4c1ed96c4da43e9f5928bec4408fe60e7a3cc2
SHA256d5b3c7cb499dbbcc02d634eccc212a433c7b65507b078b46156b35e31e53d750
SHA512dabf05e0a396046139b9fb3e6eb40c11fc4e026c32e9ff9f3739db75dd1477775dd344fd8af7e2bf40e560d3f99dd8ad70c0848d7a9eea98c60b446b990bdb07
-
Filesize
5KB
MD5ed2069891e24261c369fb951b462040c
SHA1bc66bdc570a86b6d180d9bcd417cef144a491b94
SHA25680c7012dd47bc1bc38d82a69dcdd38ed1c67e9584ba411276a97e325df76ba69
SHA5129a24690e970c5d5c7316a1e4b5e1eae8d95b791d7aabe602fbbe49dc53e70d1e821643dd7618357ba967c5d661d6f4aac43feeeba23cde52a8c9cd4a70f811f8
-
Filesize
2KB
MD518f6dc6e02d8d80777b49e593bf0750a
SHA1154a39d1afadf650c28dd2b04cf863870fb06e01
SHA2560f54b78f757371ec29d28c0c75af799f22bd01e6e22aff1ee5e43a3f6bf92be9
SHA5126b38732684de0e4f4bea7cd78423bc89011c87471e62da25f4ea62e5fda03edcb989013ff2b92c7b1254c8e418f0ced7103cdcd8db2fccfbe31b887788a37ef5
-
Filesize
480B
MD519d4b73fb59e6e72829ba740e4deccaf
SHA1ca8b24e55b8b47104fef23cf8a867e159be6012a
SHA25627a71e7844ac3ea79d6d1ecc16d0f131593f735663c86a6a7b34536661b31ffe
SHA51207ee59c3540513ab028746bbdfc42f25878011dc2bd7a65ffe6fe64e7b34423eba3365bd945a9829acb3e66e8cf5ffbaa06708b51114b6875c78893c12e50b2f
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\restore_files_xyhek.txt
Filesize24KB
MD537ad5a8d02938e11e0ec509a7250cfab
SHA1f3bc6aed015f4db8b4b1d3b436eda61b31e459a2
SHA2561fb29faed189b394fcf022f9e9b91e8132cecdae354290c4123c1d2741c89d26
SHA512d0b8f4cc9b4b687dc0fdb4711bff85329162b29a35a4311e6a3f73f74c490af9cf5ffce61051a06c846015e340e5426e28ce144b37bb2f11bf15d52a208fbe57
-
C:\ProgramData\Package Cache\{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}v56.64.8804\restore_files_xyhek.txt
Filesize25KB
MD592508add31fac4966d43256cdb261eca
SHA106f73c98fcfbbd9ac515dfb2d082d0b44e5a8e52
SHA2565239c1ec24f1c642d295dc72251f63a1e3a65753432fe8de746a3fdc9bdddb19
SHA512462d6ab7f2aa8d8997cf2b9669162fbda9c8f879efddf054e537825be13d6e8652fe1c04b48902b78c406f15c2cbb40c5e892afee776b22c449f93b3186d82bd
-
Filesize
25KB
MD555346c9be32ed5a020cd9eaf48e79341
SHA17d5cbb75a148d6de19b54efdb067e63db5487372
SHA25635faa9603b056fa1c60c3b0a806952ef54ef7f6deb1944f4c2ed1baab0a0ee25
SHA512e81872544296ff01b002227ecf05a2cc05473626f87ff7f8754d840a36c29248de24fa2e068cf8def15b49a01a311349f4eb8cadc3e854e07c47f1d3ed4673b8
-
C:\ProgramData\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\restore_files_xyhek.txt
Filesize25KB
MD587dfbfcd1208da861114d15ba9d8ce51
SHA17cd6c6b685e3af600af27372d1fd4244bb8d4963
SHA2561011a4c7b57d0060ace5954fa9d2f9da246d899a68a3149a838eb265bb6e7b36
SHA5126cd8ed7ff22eb64b4ebfd051054e9726c7e4d793bb81a411d52e2be8b593d7dd2e86aeb31fa487c7a563cbc17f984d3bdb53c058f02f0be7c186b7b0b0b208e0
-
C:\ProgramData\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\vcRuntimeAdditional_amd64\restore_files_xyhek.txt
Filesize25KB
MD5c2c773fce24b48f98fc16e2a4a645e1a
SHA19491c87f139ce7c35e1c8393e3237faf7162f147
SHA256569ff22260d53e073db970ed34389e73fa09e97b53392d98cd983f365a2e4f91
SHA512160a7fde5535617481af0574cfd3704ebcd9f34db8a6caee54d20e14048ddaf77bfce57492315c44ad5d1d16776636d18774720c3d61202a3c7ee4cc95f9247d
-
C:\ProgramData\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\restore_files_xyhek.txt
Filesize25KB
MD55f257033e9ce9b2c19c0793966eed00f
SHA14deb4b18099740a9133a311387b74ba740657075
SHA256181caed88b6fe5a3bc1cd131f76cd06df2e8ce70004212a26ac00a4b7950d64f
SHA512233ddbef25e2b56c63ce580a5e6834225d91fec5685728791f42e5e9e7a86d5f614cdef46fc6702741736bf4ff2e6f6214e7a03910bf45a0a94ca2a409adccee
-
C:\ProgramData\Package Cache\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}v48.108.8828\restore_files_xyhek.txt
Filesize25KB
MD5b90be75cce6f02f7e6fa0cf9a87c035a
SHA1d20d3b5aaa89c01d2f4ccda2a22f05869c97b397
SHA2564758c8ce411e3a6cec28ce0441d132200068977e3c5ff276b740b472e1e70663
SHA512725c5ee3b23575564cc3d5e23b7892c02beefed040e3bcc04150f82141445ab073187669c15ba605f628a14b00458e6393831bd5f137560532175d1f16e8e917
-
Filesize
25KB
MD57ce1d224320ff140751999c81285ebcd
SHA113c00018c5d5dd7903f4e7801aa6c8f0e8f915f8
SHA25624d8df6557da36890a482a0069bc2212200de0a30c2b3fb5968e7063e62d103f
SHA512110d5c439532159d44dcdbdffb33b8df577d2d7dcf887fce8ce87b8ad592d655c3f9b91ba469b660270a1ffec0fceacb281d0c037e1f5f326622a7ea1642f8d6
-
C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\restore_files_xyhek.txt
Filesize25KB
MD50491c86ddcdbd74a6583dc84f5fe34f5
SHA17b9482c96876789a45fa1787965f305a5661021c
SHA256b376ccb70702f14342925833130b3d8ab7ca32bd02b73428ae7fd8379b3af875
SHA512f72ec95e013044a4de6911e839ff05ac4b57e9d998fa46cf7402e706519077cf7fd9182826b8ab1fea8d4295ca313305ccfac4dbd2b834c4bf2476f9eb2ef7d7
-
C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\restore_files_xyhek.txt
Filesize24KB
MD500055a91f6aa8e308e6c0ee7be1a4a1c
SHA1b5871222e50d9ee5186263be7f958c948ab168a6
SHA2566e368bd0a4a325151953c6b99713ac7b9f4d00b1aa528a1230a4dacac2d3541c
SHA512230590b616d9fa6b4475cf0203becbf3fef1780d05f4548aa43e6a34c343fa3b5ea0310ab9d64a3968b4496aa1221a7aa0ca9f39b40e4be11c8fd108719a5361
-
C:\ProgramData\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\restore_files_xyhek.txt
Filesize25KB
MD5b28e1d216a72a406e9f50738fdcf5e5c
SHA1c0aeea05d880fbb1cebaa60a8ab7299e541aaf43
SHA256abf2985fdcd9d86efbd7a25b578c001c19c2105c62377ed7b3e66a6ca8065da2
SHA5124d83e1ab131ff57f65bc26aa530e2d2dc045a2850ceeb559074b9daf942599e92bb063ed08d3b64258835d6540c386d2e7a3e093cf5cd13a75c7d508abf772b1
-
Filesize
24KB
MD52e53c3b7640ca3929de2b2f9a0c4824c
SHA1ad04c9c266ab0a42f8974d582469064702e7a0d6
SHA2562c6686629a847c546bac90c721faced990839c13c20f217446e91ad9835eedaf
SHA5126ece8770591737c569781772bd4daf590a5b7bb9c9fa64ba8f3502e42441e39b9d36876646eab8eb8a8cb8ea87bf2dbc9ddcac8fceb063c887c6745b15d7f961
-
Filesize
24KB
MD57f7b4bf4d85c2b0ef02c18d21bc35bea
SHA107a66da2c4360f51de114fa4d4dac19e0e586146
SHA25628299627194750833149606939f2a36346d9c3404dd04dd24d9831d0c088240e
SHA512a1a3be0051811e741e07d21bd114d37b2ad67e35739f078821ac6c93f410656c89f04cf04f4697d0cf58a7c4df9809484c6e1c10cfd7ca4a2b2ef7f84bd7ccd8
-
Filesize
24KB
MD5d8c359a6fbff39e8b1f60dde94b2ed62
SHA107b13587ba8a65648a9605b19d10068f7e5e6957
SHA256adbf3584b1e9579ca112143c6cada3b352daba8bbc76d229b256e568165e3e0c
SHA5124d47b46dabc3aadc342e7015165855debfba6a366cab7dff3735544659a925d98736ae4d6910875aaeaad453e622246c9e163046aa61482e3f251fd0e723284d
-
C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\packages\restore_files_xyhek.txt
Filesize24KB
MD533e3b9fbeead5f4ac347e1387f814c74
SHA1bcc235d4a2754527c8651adb6baa6004ad1a87a7
SHA256a44e05bb59be0682536ad974afed7624e2832880d9fcc7659920203c941afe44
SHA5123d74eaaa131a78a5f28195e052c428166b722f83dae700d5db45906141ac944a89f3b3490bda1411abe13c07ea3bccd17c958fa806cf9a1481c2bd0c7b673c32
-
C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\packages\vcRuntimeMinimum_amd64\restore_files_xyhek.txt
Filesize24KB
MD5c7f8b819ee847f472aa9b59101189ab5
SHA1bf050b8d0aa2d0b005d38dbe4bfb1a57c9d6818d
SHA2565f8c9fc2625967eb0de8a798705ea158361e99f72ce24acbce2617b6c1864880
SHA51268b644c4723bb1ae722bcfe5f8c395d0a001f11cd77f7bf1e93040014a96a5918db90be39847ce4ddf1f375446f9b683bd603bc2b0ca641565776c5ca3fd6a36
-
C:\ProgramData\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\restore_files_xyhek.txt
Filesize24KB
MD534abacd7e6b559b068ec61ed92e87468
SHA16f1142c9681de31816b125d0cd16428aa338e9f0
SHA2563e857ca93499a863d0c63f3f4f1e40499948bb4050027825e4e3aae6c941b934
SHA512c5e4802ebcd612bd2bf9c6d8db166c929fb533b30b4bfc71ec1e478ed4af6c30ea6034154d4226a5dcfa10544833785a1b6685b107711f112ef38778286ae7fb
-
C:\ProgramData\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\packages\restore_files_xyhek.txt
Filesize24KB
MD551cfb4707a724492ecab94abd77a889d
SHA17c6aa216e0480a0838a0c5e5372e2fc2c9b7c633
SHA25649a10044e000d7263e9ec93d110f46b90682ce372ab589495659832606248c0a
SHA5123b43a72908871340d09ad1aa9b4aa2f52f00e5bb41cd70b0089e3605c6f27b4181f4e3e57d69ba0a92844e02db256c97be6ba6660b7b4afa58ec367e8d433dc8
-
C:\ProgramData\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\packages\vcRuntimeAdditional_amd64\restore_files_xyhek.txt
Filesize24KB
MD5980b77156efd299a2f7b91071ccf51af
SHA1d0ecd1b95e0ff32cad671d532d59953214c5c41a
SHA256d9f04dcf54cd5af901673fb9510395f4bc70e8e5d9bf12259b9ae823d96ca5fe
SHA5125f7a376f346b3014f2b9eb70fbbbb5237f0982db9d825c6d8004ab1ae08a76959a0dea14818c4dc21b27701dc83721421679461ab18954fd6ac860fe85e7060c
-
C:\ProgramData\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\restore_files_xyhek.txt
Filesize24KB
MD5ae0f9a38af1e1d9cc4671c60ac4e4ead
SHA1fda23dee3d7f7535307536baf40641cf4928ae30
SHA25620313ce76955dbd4917bd5433a467219a158280182b315d298d65f8b7003352b
SHA512f8fd7873eb045fe6cd33d73a8717542d66178b1ba5731496394da14bd19c2e8878853715ff944153831d257b4716208c82392ee7932142633b6b84ba26eb0784
-
C:\ProgramData\Package Cache\{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}v48.108.8828\restore_files_xyhek.txt
Filesize24KB
MD5945f25ea44beae0e145d6a1d07b5c5f0
SHA1b9ad2c9b503a550c6af35b8555e91ac307713ccc
SHA256a78ae14a83382d2138e032411b44269f9e392beaa39db18e60a67780691b3e79
SHA512e156c36fddb3825551e7792ae8aa74e8c1a52ced40da271bdfe594773e5a462551930dec08c49270f39f2c6bb83c6cf30e72c089d96faa7da4df816b5d0897bd
-
C:\ProgramData\Package Cache\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}v48.108.8828\restore_files_xyhek.txt
Filesize24KB
MD505492cb2fd8a6b369893d1aa1793c1a0
SHA169cf13a110a89d975c961c83e0cb172ec823fc2e
SHA2564aacfaa155f64f5483e40d077832340b35362a12c1ee04dfb5d9f262b6bc7447
SHA512fd4505e5f5c4f8fd4b24eaa536762699cfcf9714711f4f5b4d8b602e333b4a9a2fe1b3b29a1e76e6a368489ff573a0f7ddd46647c69da4cf37992354305f0118
-
C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\packages\restore_files_xyhek.txt
Filesize24KB
MD5d82b23c3ccf7f86958dde58d96a14437
SHA1fef0ad14e97dab6c5b2697a378ddb1be4617dea6
SHA256140cf2ed1f3fd1bae6c27e3e5fea3cc413c8ca1f507abf0702fd1c58a8c9af46
SHA512cb4135d42a04acc165f22a75957b383524f8485d2cd3af2f09672a03f94f669e03562d16182422aa33c8fdb3bf0b5410f2286d5c5f8b352680f5b615ccd2e023
-
C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\packages\vcRuntimeAdditional_x86\restore_files_xyhek.txt
Filesize24KB
MD51b41ac65d14302acbedbb6eac3ee4468
SHA1ac514efbcc79c14697f934f275aa809b65a8ddaf
SHA256124f17223e7e315898d3667ec5f3a2e373577bf1ad45a44721f17147613160df
SHA5120fd3f2027d9e37fedb1b2ee3d07803122672f981f80ff713a6bdcfdf3af5944ce94bdc852d16fd36939c64dcba13fb05d9992c022dd90a5571e1fecb7105d1c8
-
C:\ProgramData\Package Cache\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\restore_files_xyhek.txt
Filesize24KB
MD5cb8f31759b495e139516bcc2042eae2c
SHA1736136a6851952ca9ca6b1072279d8a7c334c8aa
SHA25687691ebb28980c9a3c75b60ecedc486ae9b5e435e27671c0870479e174c64df3
SHA51226dbb0792ff030c8138a916e250d3ba7f41c723fe6effd92ff0059ef50ed293f1f2912856fce7582ef1edb4ce3c99a9e5134eccd7886070ab356f6edb79e7a3b
-
C:\ProgramData\Package Cache\{9F51D16B-42E8-4A4A-8228-75045541A2AE}v56.64.8781\restore_files_xyhek.txt
Filesize24KB
MD5089ec420263366deae36e31e78e2b481
SHA1d7c66630ea2468dbe3d72f0a55e7a0418ef3999e
SHA2565011c07799e5290326c4610e99a5411cbf86e1b8b0e05ab36ad3247b53c77a58
SHA512e301188dcc84d2782b5e059bd08987a04495f7bd1a3d5df41d19be2acccaebaf7ab10a52e3a3edc3edc9b90c33f46b29bed6268e1986ebf6f39e923c5ab100a7
-
C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\restore_files_xyhek.txt
Filesize24KB
MD55fa12f4a7d4102dd4a12fbf28cc6533e
SHA184f3f04c445de25f91a488494e73f97bf3ccf689
SHA256873c680814aa1d8d499bf21e492d6b57aa62452b9e1cba7abdbd96e985dbfd36
SHA512953b89a42e828327af9bb617b26b2431d9dd07cf22264dcdb2d98b810141712e6a7e6cde0ed74fd58729f5a21d6938dde74f8fec9fbcb08f9e9c5fdf1159d177
-
C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\vcRuntimeAdditional_x86\restore_files_xyhek.txt
Filesize24KB
MD5ecf995a9af495243366ce13e4dd607c8
SHA1b1543722d3c46c7723de639624654c4739f0d12f
SHA2560cbaf6adf34317d262b9ffeeb497a82380922540cdf3884eec7f71c40c67b245
SHA51209b95053f697c2e4aca122768b7558d8eddc253c75ff3590812efe1d6c0e612c266c55cd02c76b73b8183d9dcfe93737ae837faea00d42c55043de829206cddd
-
C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\restore_files_xyhek.txt
Filesize24KB
MD5364010300cc3c1e09348cb6da5be39c7
SHA1391b4079c1774d103005ce63274ba1fbbafd2aff
SHA256fad19f15e435d8d9d6cdd1714c0bdc6b4dd0d44908f5939d1f4021e72c4e1b1a
SHA5126b2ff0a48f4bf6d3ac1a42ad05156fa629e1e7576160325b731a711d271d502632a891377e9cdb3e6eff202bc8d4ac11cfa3b5c285c1ece82acac7dc1ab2a74e
-
C:\ProgramData\Package Cache\{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}v64.8.8795\restore_files_xyhek.txt
Filesize24KB
MD5cd9cb9d9e2b7341024e3e8b92e4b5474
SHA1774dc7473dad3f980a851c12107da3e2faefd092
SHA25664b125d2581f5ad81691a70954cfe82a260ec945da30894369689a458f61dd3e
SHA5129c315bcd8185d1289b0bfe9c6cbd19914ea6b5a5879cdf57beef51ca9756228f6692ba2b8293d3ea487a869e3a6d811b66e981ecddb8c19f1d3390c3cf25a366
-
C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\packages\restore_files_xyhek.txt
Filesize24KB
MD508fe0bb1822e211a445e6a0708955589
SHA1ab5de829d3e914afb51286a0847b0f4963f4a166
SHA256fc2c42351262158e24e533070e28a2dd16668faf910c9cedc856423482b10ccb
SHA512c3fe25b7db8dba477ac257d94b2bc857dd4356cabd7e1a35f97ff260bc91692ef7a05250de6ae3d30077dbf52e180ac5b0e364d725e5747ad07bda7df04b1d13
-
C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\packages\vcRuntimeMinimum_x86\restore_files_xyhek.txt
Filesize24KB
MD5557d56f79a41f865540ae2b503638ab7
SHA126d5d7836cd4de2689b2c4fa43b1bdeb790626e0
SHA25635854a5fe112174cae196613c981eec02f499574ca655708a34f9b72e84a00ac
SHA512e234eb1ebc9ee3556b617bed46b280ffa2e8d4eef1745f84fb32d07660541772c311c717ee9902cb9e40de5d79cce32bc9eaed5e3c5b6935cf3a472f2c0e907b
-
C:\ProgramData\Package Cache\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\restore_files_xyhek.txt
Filesize24KB
MD55792da4aef6750b9527c3e7350e796c5
SHA1afeb95a4f3011023df0747dd172ff26cb9775b46
SHA2562fdb31f6c2f31969bec3f4271203b7239f4e758640a1a52b855fadd2a22a9ecc
SHA512be53a770aefc3d6a1e2958b61992370501f76268009d097567a4d82200ed312918410d341cadbd3a47291cd4e4967a94983fddbe102a67d18d5fab1c9e39113a
-
C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\restore_files_xyhek.txt
Filesize24KB
MD5c4cf5e616bf5ca2936865ca271aedea1
SHA1902a584063ee35341d81156b2a5f16f61095df9d
SHA25637f7181a2af04b9830228153cb3cdb473b301e934b29959f7eb79434974b4fd3
SHA512c74a080ec14b78be01a2b07ffe6c5181d6b719c038488a37b9d2a56ea1f582fa835f9710c5d267eba9ee8a7542eb96f705e1da9f9532ee4ff85ad093e3605fc7
-
C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\vcRuntimeAdditional_x86\restore_files_xyhek.txt
Filesize24KB
MD5f91361bdab01e41056dfc16168d5d127
SHA1805b340d15b5eb2e852a9f13cbb452def7f8b1b6
SHA25618ebfe097eb410ba60b52a2bc63bbad1c7406fdd0a2f3f4d6394d38cd7036a78
SHA5127989f7801305cdfa9d13463e579cd186d2349ba905b0ea21e6faa448a3df08283518ec9b159069c00d267f4d8d4ff619998ed5d7ccf1d25b7c3ed58c8ae42b73
-
C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\restore_files_xyhek.txt
Filesize24KB
MD50581aa122ed3e830437cc49236941b86
SHA183c61480ff0d2e178d32dfec870e0c015eba837d
SHA2569364f1cb8ef92db6a7914d2548628e092ac2cecf96c00863ccca05b8792ca278
SHA5126e8633271a2884bc0d8cae7df69d51f1406cd0abd2fca07aff4ab2c6bd4aba949d0befb87ac72d2b113303b8d5cc2b60831bd98063111dcad59cd9389341fd9c
-
C:\ProgramData\Package Cache\{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}v64.8.8795\restore_files_xyhek.txt
Filesize24KB
MD55eb0b552f9672517ad9896a7f3125acf
SHA1a52df6eaab8e7f797ae2d33e5748c0c2aa43ec94
SHA256d9bf223368e8b86f80c78715a78d06817198162091c4a1dbcc7e0a8c26333fdf
SHA512fbdf3243e0b5a2d9095026115e138c082638334a5700048e0f361a51b64b055ac64ca76c7eef744a485848da64dc6c2ecdb4678f6d11fadb80eb5dd24fa37a63
-
C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\restore_files_xyhek.txt
Filesize24KB
MD5adfe9ec72244280107a1acf6ceef2bdb
SHA18113a9d8e69984110e2408cdf3eb2e440f5429a7
SHA25650d7f9e889f07b864b7287f8c5b8af1b5586113774eba93c611e7dd015ce7f33
SHA512d8a782c7eb623e76763bbd5c354b09d95afeabe3b0e3c26b1568a67f52e630b9f46572423979c67a42cb1456684a2bd3cfd5d66a5fc64302e705b4999347e0a7
-
C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\restore_files_xyhek.txt
Filesize24KB
MD5f4114dd8c82ddc2140f1af4e8af15f44
SHA1e6fe579ad084fdb91e5874e76f604501dc50aab5
SHA256e6f64a849a641aebcb99a3d83cad2ff79144bb2622c528c403d2fd08d0d0049a
SHA512ff41639b13928750715c0b566c5bbdbe6bf3ebb6722ea23c2dc322475d0b0523e5a781bc61387a1f53fd7ef07c1a8b202d82b161f56e829ee0ef57c925d89ea5
-
C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\restore_files_xyhek.txt
Filesize24KB
MD5c80ae85f600afa183401162717841b75
SHA1e093981acd26aa346235929991755eb652363978
SHA256c60a598e2961c8315838e2373952793ee548c3991c75f762d5c25fa558309439
SHA512022582d1adcc2d06d662757a230e9f9e5bc4684c159a44b7ca0b2e6560c9a6a89c7297e6e1432b66481fd27e44f000c1ae2a1b7f96f361a081b1f67db7e57c2b
-
C:\ProgramData\Package Cache\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}v56.64.8781\restore_files_xyhek.txt
Filesize24KB
MD5a8ad9cd46ec653f10ccea86c2a795970
SHA1f0ec15cb5f8c8a87a126ded6f8a2c9b2601bb578
SHA2569e5de09f16bfdcac52c6a7fcb802bdf7eb20b4033a49f60700311c147a6546d7
SHA512a5be7345b8b873315a165be88e1b581b2ef38c806d59e451731dc4b5fafc2df7cb5693fc4f0e6e24ab737aefbce6cac7c1c1a71d8a39343a5218f3b29beeb777
-
C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\restore_files_xyhek.txt
Filesize24KB
MD59b80d54744564b50d866cab23af332e7
SHA1db0286aca607202d33cc0877bc87991980aaea49
SHA256b63026cf8fc9b5bd5c924bf87edc43d6c3c1ad6a63d8d06b6743a98a24e0be2b
SHA5124882535e9d62001761fe0b084fd3eb9de6a608b55dc25a503c8ed3f082b6500e9e15c7cb77feb82d48e124c65c0c2fd52d3772575eb71918ceb7ea50d9b9418b
-
C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\restore_files_xyhek.txt
Filesize24KB
MD5358b2da83ebeb24057d306bd8810e296
SHA175b4fa915fcebfbe6207640f0b32dded7967988e
SHA2565df44b81dcb2f123e511573e302a92341166078638f99b73d57052540d3a8f64
SHA512a855622db3a302fc12f8fc6f995a06db329059f3eea4f08a4811f17d5309b52437218433949ee6ccf51aa5c70641662ad4805c2535542e1b314167d3d4736c80
-
C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\restore_files_xyhek.txt
Filesize24KB
MD5f7dc345ff2bdd3349311830dc0cc9430
SHA1aaf4224b3ae60f097ac67528821bb980642cbcc1
SHA256286dc3f40041c01d4bd7301cae9657b9a1e7be0f0a73a46ea737319d117e0d59
SHA5127c24107661de3fccf5eb4e2df1ee37be33efd876b0fc1f2db7656d651fa68d9355497c9229236e6d905ffe7e01b6dabb4b5f09372f065947770584c6868f7b63
-
C:\ProgramData\Package Cache\{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}v64.8.8806\restore_files_xyhek.txt
Filesize24KB
MD5bdc40d8c74bb0fe6dfc73305456e5c80
SHA195b0bebf463b7601c6adae44acc875b60b4ef357
SHA256656d47214ea4860b400d4870e618cbf796dac3849bc8949c05fd30f4129b275e
SHA512feb56228a80de570f275c88cf7dfddcb9c5c87a8133112db191b4610109f34a74e631221e27b20ddb5668f46c5a1363696c062d23d299b25d49ea536ae7fc8a5
-
C:\ProgramData\Package Cache\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\packages\restore_files_xyhek.txt
Filesize24KB
MD50c8418d85378d4393530cec17055a295
SHA172057498fb2956cb81af36d2dbe8a9baae1cd81c
SHA256ca79634e3bf7e05e7198ce9af7a50a364bc8c6417c7d4de515c8f686c46fcef5
SHA512e729f09f7ff4ec467ecde61b739a9de7252c015b498e13f3a7b4df0e27edadad50ea2142345fbc74bccd16a54119cbebcdabc8639a6bb9a8df8c97acb98e75b2
-
C:\ProgramData\Package Cache\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\packages\vcRuntimeMinimum_x86\restore_files_xyhek.txt
Filesize24KB
MD50b1d94438f1c30f2a76431fa5f74ce3d
SHA185156cbe8ede04521842f03ebc306e62c01abc9f
SHA25651c3c8af82df3382e3e8482e9f23bc6681929622d9a6e922fd200b323c0305ca
SHA51294cdf2fbe5b65e5b76e3da55cffb27cf92789617e23b32d2f8019ecc58ef177278d5d81370aa4a16b23a7f7e7993e03ae50137c023866c462c96c71b0e66c2c8
-
C:\ProgramData\Package Cache\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\restore_files_xyhek.txt
Filesize24KB
MD57f2e4613c14a582414abab7e09bc0a86
SHA19d02a2facfffc5735d07de0bddd0725f0449808b
SHA256b55075f95ec7727b7eb1fd47c44b2df2b33b82e499657fccbff63f9938bc755b
SHA512825ca9c3c06941e9e4c1c6c29e783682c07b23d0724940c752cfa2439f489281d27f0d2a3a2854d225aa6878f7e797cbf62c821a8582cbfad1dd0b817093289d
-
C:\ProgramData\Package Cache\{E634F316-BEB6-4FB3-A612-F7102F576165}v48.108.8836\restore_files_xyhek.txt
Filesize24KB
MD593d59aa1a8e8e06813b28e69f380012f
SHA1d9d00d3a7b650bcd2990cba7d3970ae233abda00
SHA2569f69daf277f7953187cddd5617078dfb53c89d9681d8ab7d100bbad6e3750253
SHA512a1386017695000f2b38dfe47fd9bbaf631729be4e11431b8fe472e97c56c6881f5dd1f71c60e3e5c381099ac8af8fb628ca5149c755d61664391e16555b36678
-
C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\packages\restore_files_xyhek.txt
Filesize24KB
MD5dd10d63dc901df2f458bced04f36c424
SHA17b23f28d8ccefd419272eeb1e36e4a773b0e1f32
SHA25671325b8f9993892b39a4579b168c80d302e147defcc4f7c10c919ec344546ead
SHA512d2191555ab9f61dd0035790daad1232c13ce32e0dc8112c4899b872265b59538cf90b9f844f0faf10ad27c437faa388c7613cd19a40fef2e806de82a9b4263df
-
C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\packages\vcRuntimeMinimum_x86\restore_files_xyhek.txt
Filesize24KB
MD53906418dc8b7327dd64a00c8292231c4
SHA122222cb1769bb96e221245fac9927fc3bfcefb6a
SHA2561d4f318f8520aeff0bebcbb9687e81950501e996b5ae646e5569ab59eef35819
SHA5127b431183e988b69bc0bc4c4ba6278fc2abf5253406dd39329255bbded011fc9c1ee096f626c611a2ce0f4e326e06b6c8fe155a55af8703e19ab5a54de31dd8ef
-
C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\restore_files_xyhek.txt
Filesize24KB
MD5c8ea7c9d37ab66453baabbae7b3ec332
SHA19bf1bc153b61001f890abf68b4f73903614375bf
SHA256ed8e347e37880c55322cd9b3f46ff0c3578c4293a8dbf3f1628259c5cafa63de
SHA5120b2eb46745405f725a4b28a2ab059cc95b3b51431a95881a7c7c636be75045ffe0c5ce01dacf19b90d34069ad368ce6029cf306610355246a69de7d12c62b05a
-
Filesize
24KB
MD590b5e17add69f1c23e4f3e918ca5126a
SHA135e27b4fae3fb54dc308df008c9ba2471b381b56
SHA2560461445a5d9ca3d0d252272ef4341f784111563fa55313b109a1622dcff8c55c
SHA512f4c8a4d868672510c01d33033567da9f7ad0671662489e28c3504ab50e37155eabeca05e130e7f36e5549c83fca3bfe047aa6ebae166af57e7f81afb34948c9b
-
Filesize
24KB
MD5a13bb408ab8e0b090ca210d661c85faf
SHA1c2017a8746f20a70dcaa7a8a20eff4d14a8b8d59
SHA2568e572daf48b9d16b41d44404125a320a30d147603727fb118c3a6015e8247dfa
SHA512d82b4260086b87bbe22daeb52aed37088b7e24279de6db9c2c52e577bece0515ca7f028b462f4fc53c0ed35212f04ddb9143064f0f2e3c6fff3284e25a0c7dfc
-
Filesize
24KB
MD5b8580ea1c130ad73bf386c22d674f443
SHA187645e42cba32db838c485b588978a6bbe6b57f4
SHA256697f86094a44a21a608e97e413648ffa7a9dae064ce26484c4ab2603a75a0206
SHA51279aec1d01d2c384b95aa6795bea9bb05e56310e167ba30eb1c49ab4ed5353d723a8a07c78c55e0758c3b195e9d59a00a6fdc368afd0dfd237f973773cbcb35a9
-
Filesize
24KB
MD55ca0d133f3dd8d45acb3ac8b9eccca3b
SHA1e37829ea89088ab10c1a8a827f7fccc842f97ca7
SHA2561a074855dabf47c36e4326e6166ff916285a6aff50d471d990801d010432ff32
SHA51208bb846fab495b3820ef863e9c37aaaf64d0a42eff55709e158016b9c21e15fcd5feb903b5157872b4955fea2bf9f6166babc4044ef20dda965adf97f12eaf2e
-
C:\ProgramData\Packages\Microsoft.549981C3F5F10_8wekyb3d8bbwe\S-1-5-21-1161330783-2912525651-1278508834-1000\restore_files_xyhek.txt
Filesize24KB
MD5c2a28a79916d929cc8469137fd7d6bad
SHA1ce011ec5fa8cb18d16a809524bbd39af05c76067
SHA256f3de1139737aa792c2253853dfde8eefa2be6e3202f3a33dc836b84f9047c582
SHA512112642a867ca2b966666ca3c153ca4ad5a1d94d3fcfc9b846721c5dd8b3dbc7cb180acb5f7b62fd70396bda815c391362a0e95eb328a631d1228048afc8f40eb
-
C:\ProgramData\Packages\Microsoft.DesktopAppInstaller_8wekyb3d8bbwe\S-1-5-21-1161330783-2912525651-1278508834-1000\restore_files_xyhek.txt
Filesize24KB
MD5209616e527dec909a2ff339a261ef4ac
SHA1b460227a042cb2749330675f670aabf374d2dab3
SHA256268fb4dca6ff3ec2147886ec14de6a9c330e2ed0d55a36e1396147e04340af68
SHA5126c5b1da000c880a761ad3fa793fce64724c2cc22a0c1246bcf9303f714f1828ad9091fc11efb16e52de4e90a70e62d3beea2f6f41102a919176274043c00b9a6
-
Filesize
24KB
MD594fe7c54551a28a774604aea44363069
SHA1d5cbd664c1093879a1613e411be47e14dbf61d62
SHA2564d061c7d3e5438410b78fcd81ce83713d2e928b8d0cae9c90ce41620d866588b
SHA5127076850ae9943232cffb861ebe70130f89dddf443199d0bb48f81a7cc4931e4f8990d04f99de494d403186bf1f9afc94689b3ed1bd7041d3689e3b8092d6cbda
-
C:\ProgramData\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\S-1-5-21-1161330783-2912525651-1278508834-1000\restore_files_xyhek.txt
Filesize24KB
MD53de8dd5831b2f06785c284d9b886b56c
SHA1c06ecc44c289927435cc45984374df45182980e1
SHA2567ce54e837cd73314b67372bffd5f37cd5853fcbde0007e3c0fb689730c0f5e37
SHA512b6f4a493a0706bd9f451e719a906f3dbde9adf847e48aed2b9cc7fe547c7be97409ff18d96a043063c2cc91b2cb2d9e7a86142cdcad3ea8e37165f51a90bc038
-
Filesize
12KB
MD5c321e4e94353306c679f6b4ffadae627
SHA11d91574670c8771e0eb5f8b5819eb25ef02fff24
SHA25680ec8ad31083bbfd7371d12859892e4f1eb9775857ba71856fafd421cfbbc850
SHA51265ad41fef363b5dc5be746af2e4cd64b889adaa57450b5bbb40cd71e0836834003a140edef75b95c4b7562f024cb731c7982ba7062197ff5dbb1b3090607f583
-
Filesize
10KB
MD5a350790990a0de0a849d65797cdf0102
SHA1c1499fc362d85775d17a4c4291de05bdbad644d2
SHA256570ccf2013e58ac08bfed8c4d51053f6151b7a357670fd9c77d41c0773c7e596
SHA512045bc7c3b9c86ca0badfab325d8b842744b8c4d2f6e606adafc02d66d7d2429042c7cb075cbdb32a1009a90f1dfa9491ef6d3789dcdf357a997e685bae3b040e
-
Filesize
85B
MD5f09fda510441e55b3089a956357f3a34
SHA1eb967b50c488f7b2ae46dd49e6d6d2ceac418e06
SHA256ed06a5277833b103499cfcde1400df3bf4881fa49fa037db23c7948a65c4713d
SHA512dd00117873a630aeeafa37a84e1e2c2206579fd154acb3c0a6cde23c34f8b63f16ada4916930b2cd75abd40baf7745254cd3b39101f8cbbdb9e041509fbdf1d6
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
Filesize
672B
MD517339b4e0be5b444450259d2cb80f63f
SHA1b31124639a17b84c9e3f921b755d4b3bfbd34412
SHA256618f7bec7488149da01fd6c95150b5678e4e0af83c95f4075a74bd6b2e030a30
SHA512d0cafa6f29f5ab28144c65c2ccdd44eb0ebf4f384d74a5a49f9be135132b41e5f8c9471669d5ac932632ebf6b31545089a12459f75a5e8b67aa1347faad6c9a8
-
Filesize
152B
MD53c6e13dc1762aa873320bed152204f3c
SHA138df427d38ca5ce6ce203490a9fb8461c7444e12
SHA2565c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371
SHA512133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c
-
Filesize
152B
MD5f5da507c2059b715761792e7106405f0
SHA1a277fd608467c5a666cf4a4a3e16823b93c6777f
SHA2568c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8
SHA51201c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870
-
Filesize
152B
MD58f37d2335c33a1ab36fe0d33a9da7e73
SHA19d7e9dc7db6c508418fa98d073fb1b4ab594eaeb
SHA256bc0a1b16a51249eabdd4a82952bdc9220ba861b83ccfa9119c14834cc24ca580
SHA5125cfa7645688821b7f7581c7ee5bca2a2a257536b135faf6d68a696287eca6e689e0511c7f5c176f1ec1c99b43e9c5175c79329f27d592824d036b5e8bf66b88b
-
Filesize
152B
MD58f203d2ba3090fcb5eb19057f50c544d
SHA1e9c4eab99cf78a80e1b7d7a68a667ec0a072c731
SHA25659641258c0d4af7d8cdc2bda378902f4d9d7ee38d45e0c6e5bdb34a3f5d65b3f
SHA5127e0b2ea9e50191f7f84522f7a5960d54a2d88967ba21bce45238d1066b6697a45bfed7f10fc1fb0707478dc00e49681f71e95e2c7c0c06d1575a02e5b05c920b
-
Filesize
264KB
MD503714f4f5e1ee1b379b74924498d7498
SHA1a0a62ef66ea11d953db8c22de2ee08b53e55b710
SHA256839fe870d34fd1c621aaca42246b52161b0f77515d4c227ba7cc411327067aa2
SHA512086b7e3a0b5e4a4bafa654e2d8f69f89bd41a9b159091d183af3046d7ebc2ffc3ea44bf5475820411586c52a824c7494aa49231ef3e8451527bb4b475d3bc80c
-
Filesize
6KB
MD563c15d23a723cc7fdc6742fcc9d55d98
SHA16ffc931f20c6dfe5209d656dec99c126d32ac16e
SHA256f924c1e4456b6f1771297d914e346da090e9f589bb87a57524046a8e0d647264
SHA51206b61c8b4be658cf53c8f779e0cda480ec309644d0cda765e49f2dde83b52f983da5aee79513c4e93b0014cf87274e40b1473d6ac2cef16a9913778b2dc33af5
-
Filesize
6KB
MD5383aaafac315d797f4b45cd66ef14e2e
SHA1961226b3917a9071a7da00f5e5a3864b51a111b6
SHA25626d549bdc25682062b25f44795ecb38fc892bb188a788b28ace42d269287391a
SHA512ad045a950583815ead7868b1070800bff9013d042554be440efc266d26e68a3ffb2c9ec4bd76997d7490fe580711c6ac883dc54181c8365834fddfa37818c57f
-
Filesize
6KB
MD563b07bcdb242eac0f8439cc77ee20dfc
SHA19393adf9e45970bd13583124a714fedb878104aa
SHA256d313b196ef73ac61706cfd08d0e24aa7dab106e6b57566d9b7e610e8d485e1fd
SHA512e009e2ce5d09659ddf7438d8a0600efe04856e72b72fb22cb90fe8a86955c7da6829c6ac13ac6a4e3bc5bdcc0d44bca69ae0ae0a76eeff2e343a1dd6619fa451
-
Filesize
6KB
MD550c200d777033715982f9bb9e967a215
SHA149b4c0b697d4b249be2daa8e79a31cbd18859b48
SHA25630a13347891742717631d1ba0dd8375cc3215ae4742ff648a411c4c06fd3ba8d
SHA51233e9b7d67d22d7196ceb53c85ac81c5c5d5bd6abbe2c70f9bf69509308b6e9675b8a6fb7f0ad75feb8550863831c2c9c46c9ec2cd3eeb300e3c6c2c768da5aea
-
Filesize
6KB
MD525f93dfa7a3aa1df70b52b04e090af55
SHA101d9611a5fb00c371acbba456b8a564367ba611e
SHA256d1fddedeb501cdf1dcbd41bd4ba8f02cfe637ea7a3caa2752f87051da5b43b2f
SHA5120e1bc245019c803110fe8d4b54ec6b38eda8c05c7034a5c199738f6f3eaea3fc2a9a3d1b767d1d66878b05117116b3fa2038f3ba69f206427a5f0cce421a1288
-
Filesize
6KB
MD595bc852d1fcef78dab8f1afe4df4d321
SHA1b62106a077e85a26716ed581be65f278ec365db0
SHA2565fdf0fc63f72e580936bc22a8c9e8f3124573020847f5d32a27b8e6addfae7a5
SHA5124e76bc313bc6dd062f45d9e7171f55b0ae769ee17e2bfce8329bb9a39146100fcbc1c10ff3ddfa46a5162993d9d669aa65690b95b6658d1c9035c9857a2e336b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53c75d878df9cb852c7609bed3fd6a05b
SHA1af85eb32e3be29e30c2b04974ea640892e94ebe7
SHA256dd43e2befe5b432a47e3202e7beaf5b2e92d061ca88438799c7c040934cb8514
SHA512e2a39f9e793db47e57a0c7564afc5ddb48dd5ff300fe0e4686c181e95881cf5ae660e8fb3eb1f548522db95e1cde945194a5fe3ddab35afe8dcc37601caba0b9
-
Filesize
11KB
MD5b9337ffa0f42330067bd50b46d9d8d45
SHA150d1502d3803b2f0cd0d830e10384e64e22abe2a
SHA2561ba60ec772a5f037a248c02a287cb3e6176166a1477d39a62ce40b7161a56ba3
SHA512ef9f4fb51b36c93f2c366c96c99ad4341e41b50559123f602beeead0515c1859db31205672aaee89e2eb575255947c5b066be82fdfcf2898f7103006de88659a
-
Filesize
10KB
MD5bbcd142f9117551fc883e1e877ab1a66
SHA152a2948283d9831610b8e67c41179a1d8e386271
SHA2568b4d2a6ce30d64de5a55da8305ad9d67185a532aeb4786c15f24e1951e579dc7
SHA512df88099b1fae959e3ec915f61d9bced4f554e643520b82ab4ecdc98863b38b3e01a96d1d0deaa3089eada3ba815f1af3bc5c8f50543f26da29ed4f28adf18c20
-
Filesize
11KB
MD5a2094c3916c4f9b87bb85aa207e197a9
SHA11f3d4474f36c60d0708668ffe73a90f6620adef6
SHA2568fb1395d2b4039f12313501241ab23de167f095eb50e89736ed0f63a1ad7730c
SHA512d8039c4da3a1b48594161e99eaadbbb226ce7fdac5996407360447896e8214f5ca7a1e3b695061eb6777368038e9568467c0f81d5ebafd5625f7d673145c359d
-
Filesize
28KB
MD5afb747be72f6a0e516d2cd07d3acdbb1
SHA1d36f2d929afd41fe01ae694ebf404ccfe1adaa7a
SHA25669912cbddad20d59196185a64f12f27c219a68289266e4135dec4fa5c3a98337
SHA5128898432190cc6b44129c95b1b76ddd9dea927330ccf0f4b8e461d1157d3cc70485da975e82a9536571235f0893742496194faa4d0d79bfa457fa531755363cdd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133849112959841953.txt
Filesize76KB
MD5b49b94a857261ee3f775bcc406ec7f18
SHA1e4f314f86c0322226970651061ca1a760518552b
SHA2564eb06ef459cf17751407de81a3ad68837af46e5a8fb60dbc5fde8443e14eea04
SHA512f8471ba7e8d00631de3449cf73f00613f527c05cbb5a30ddb7a9fbed2a4859d03d4105f5817c1318932be50a6facb4e2945d50f358b1ff1c62fe71c3b0b796cb
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
21KB
MD592ec4dd8c0ddd8c4305ae1684ab65fb0
SHA1d850013d582a62e502942f0dd282cc0c29c4310e
SHA2565520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934
SHA512581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651
-
Filesize
14KB
MD5046074d285897c008499f7f3ad5be114
SHA1159040d616a056ee3498ec86debab58ef5036a55
SHA256254c5ccbce59ad882f7f51d0bf760cabde8c88c5af84e13cc8ad77ba0361055c
SHA512ab7436fda44e340dd5909ddec809c6b569a90d888529ef9320375e1aae7af85afcab8c1c1618551d3fe8d6ae727f7dca97aa8781b5555da759d501d2ccd749e1
-
Filesize
10KB
MD50ff5120f1afd0f295c2baa0f7192d3f8
SHA1bde842d5d11005dcb4ff1d4ea97da31865477697
SHA2564ca5bf1beb4b802914c4d3e2f37861f6ba5ecf969cfeadf5855edf58f647a721
SHA512e049ffd7aace8d136eee007ee4f8dbc2ae8f3dce79d1c633d9654392240f8215787df8a6d08085257db51f28ff2a8023a13333dda3ea7f9bdc8b9c57b605f0a0
-
Filesize
558B
MD5b8cf7bab4a4976574bc2bf5bf8a97292
SHA151da6d1884e09855510f28ff8ce5d87e883cc1c4
SHA2563e75f27d8279a213c39ad233a41431063f70e5ebee20ef1da309cb92268f21fe
SHA5129091463950a7ebe15ec65bac083e9eedb8ca518a45b29004daf9e8f3bf68c984876700265d550ba0ae81fabe3dff066c0c29cf00eca1cc475395e8a94996c45a
-
Filesize
670B
MD53418cf6d26cc89133798a2ebe6b4c8d9
SHA1bb62dad3c7c3dd11e58152aeea8848e037410cdf
SHA2563d5fc622c0867fb31855ade0129e8ce7e862227d1f5069dcd77cbaeb4f69f9c6
SHA5122c2f40098e3398615cc2a55cee66de1c3788325c3a8e6e824c3d12a1af19f9391467c97664a6aed449ee6f221a07b4920b52d23e32a7dbbeeb5d50ad385caa06
-
Filesize
5KB
MD5cd24bd16342d02d7665ddf304725046a
SHA16e359d46eb62662c9b497be1996f20a778e88a9b
SHA2567a296c111f54ca35369070b6776e787a4a588605f6f6d5acf3420731af7bcf23
SHA512a9e6319258cf05d12457fef3a2c8965c4180ebab39259e441ef0a2ca38b160f7a27184ecf8f84295b8071add95e4733d0233be2cb369a58ce8a39d8010cad0e2
-
Filesize
9KB
MD5dbdbf4017ff91c9de328697b5fd2e10a
SHA1b597a5e9a8a0b252770933feed51169b5060a09f
SHA256be60a00f32924ccbe03f9914e33b8e1ad8c8a1ca442263a69896efba74925b36
SHA5123befc15aab0a5dbe7fde96155b0499d385f2799b1a2d47ce04f37b5804006b1c6c4fff93d3cedb56a2a8172b23752b6f9dc6168cfce3596b91def3247836cf10
-
Filesize
9KB
MD5bbf8f7e57a66bd16a2809e035f6b9918
SHA1ffd985bca84ba0b6d96a634771bc42dc1064da72
SHA2563ba294e5207000f0712d8616bde121ef110f88c79edb2d3143416cc749f549c1
SHA512ee83e74c33c8d0cd48696f045dd4cb41566095ea0f7256168d1e0db2c49a93302c787b96306d9227b1b8f6e8ae1837d21525f8c4e84eff0054825478099352ec
-
Filesize
2B
MD554d54a126a783bc9cba8c06137136943
SHA1e066133fdba5e5077ee034d757dc6dfcebd12979
SHA2565312fb609f60384731fcfcb95deef3602239bf61f865a07bd8e08d818d22e9fa
SHA5124191c6e4ae49de201d2d6da4a5ae2be6ff91f4ad0e24214d374d36035371f5c9495b412fff063786338e75277c2d2221ad56cd23d8199ae3e333745fb9fcf7f1
-
Filesize
67KB
MD5ab4215e3e2defed379e64c1acbd251fe
SHA17de78373ae36f40b1633773418713e718a429f48
SHA2567cf97c5caaa325bea7c0e36c2456a625abff2a563b1d30d8eea3d238bf28be32
SHA512c04ba93fb24cd82459254b2f789757f90ac7053ba30809eacf0173b55055ac2ffbfb718d377b92ccc65e25d228baba8f053d2fd8e2cf4df78afcf2cac8aa9179
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize8KB
MD52d2b150a9c2cb5247b14d6ce832e8366
SHA149fb4ebf9d8acac233562bf5ed18322824e9bb02
SHA2565276b5627c834fe99c35547f0d4f729f128d14e98c716bcfcf665e3e58c60872
SHA51268972e4ab41b4b8afceb24302d58c84724ff4a4700e701f0ffbb9183241e41d4e64af77a1af574f2c2de5cd6e885c163bfdf456f0166f02668f3a97b74ce647f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize8KB
MD55ca0b747b101d1444b58312f7fcce8cd
SHA18d2dd83454a4426547110d0fc1dccc5c8cbcbfac
SHA256ea1b8088c01e68cd6f0b3e28bb6ccfe0c54d43443011dead3a35b840557fe6bd
SHA5126383d14279f32fd322ae0e23573dee71f55f70641e9af456e6c635b836cc8c1c814edadadf9260540a96d3e630762387608bca5f0e0354d63c1385146671da2b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize8KB
MD5d39a16a0a0107ec95a7b6d3320142706
SHA15adb4dd3f7902bc68309430a098cefaa345de890
SHA256ba476c400e01c1cc6a190d06e62dfa0ceb25ec21ed1d6c936980e96f881b7e88
SHA512049913345da5ee8dfda8fe0139b55afef958d4af7fcad989cc9abf8f82c7fc77f5ee22163653ef4f40af7d6ffaf7ebeed78072d32210a4f8b9b2c3aa96d989e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize8KB
MD5e46513ff7c9bdaf4c0c54406ada055fb
SHA14ed75218c5b4b8f5e20bbba77307951c375424ba
SHA25632a1c41731220013813cc31d7491f6d112bc06cb063614d295cc1d55e2fc4f8e
SHA512a413b3cb0cb119d61c1f0c677858a1f6a9cac80b1b2a4530cd06c82efb98bc50af0e8f723976670bb40a05e637985841dfbaf7771756c98e857bcf39847b23ec
-
Filesize
51KB
MD5bd74a3c50fd08981e89d96859e176d68
SHA10a98b96aefe60b96722d587b7c3aabcd15927618
SHA256ab305218ee0e95fa553885fa52f3a25dcc13b4deade8b7993ccb9f230a272837
SHA5120704243904abc3691177e34606fe2741945f69cf7ecb898655d98e81b145bf707d20cfa0af01fb3aa1cd170e2f3ce8f625b1612e0fcf5eba01f770617ffc9f1e
-
Filesize
56KB
MD5a93830a0101fce548a630b3256afa3da
SHA162b27948b9ddb08ac2530cb030b4ba1868ac0148
SHA25664c1f86110e60108e594e692e5e26a491f6c202fa4352841eb3d05265e073001
SHA5121ba0e66c4e02480beb8cdb5f581677d96b49523cb70d94927a2dd94d0835309ef23f181729f3c4bd00cb0dee8fda4f9978ed837943e192d308328cd8fe6e3d8f
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Onion.pxf-5e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c.exe
Filesize373KB
MD5d6c6b080a5164efbf01db30a093e62dc
SHA175158a5ddedc315e579735f885f2cda820d9927f
SHA2565e1669e26ac3710f1c4f36888d3ff85c1099a1193d734df50e6af41c9ee1d87c
SHA51240be1f832032e69c1d8fe8dbc633753bc8a5a235e917e3f7d476b4d933e86e585124121b5602c233bfd984b21100beb26e09fc3630df90ff4a56eea179749591
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.agl-d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94.exe
Filesize3.5MB
MD5d79f3ca8e35312e5e8532da17bd3f4a4
SHA14bac93ec0e08b26f5b4ab93995d4c26b06da7a5e
SHA256d17964688b9cb60574c53205570f680c675585ef168cd52855af8b5e67eb9d94
SHA512b0c53b8c75892b920761a562371ad3b3c5c8172d36398e766d836d920c8d0c0d252ab79174a9e0dcc07b7ed4b2f7f13330a3c7492b8b8c33287e7b67899023c1
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.NSIS.Xamyh.cat-22076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883.exe
Filesize382KB
MD592f9da918c01838f2b72326944a4db58
SHA1118c626dcc99a011acce5673baf6d14523a52c59
SHA25622076154173ba5f758e754981da79490c41e551cdca845a5305dfa93840ff883
SHA512812cfff5faf4bbff968666d51cce47a110dc4133c7b730e11f5861a23376b7146b22a378b1998dd83e5776126653fe1bc0abf2c5b9101a0308308a24b718f087
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Agent.zui-5f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef.exe
Filesize224KB
MD58c9bb73ea61389d67e711cf4f827ffe8
SHA10169c261bb101feb583ae883eed6a8df5b1123e3
SHA2565f2c52c65412800f0fa9d92c99a28196be265b8cded2d0c4699ecdf960acf2ef
SHA5129ee5b878adb47c9a592c5352d758b160756a0394055e974d9a2e0423ba6037a0a378208e2a9c5d005334701018260a66b93cc91d1ff61912f640922d7189ace0
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.aeqi-04d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221.exe
Filesize308KB
MD53fd0e08a21ed5da0526b57bcc535a899
SHA10b7d364ac8ed429f4510fa055a81e4920f78594b
SHA25604d1bfccee8ef600c8764e9d93a43a31013fbf793b5c668960334360a189a221
SHA5123308ffccfeb9d5d03337f4f8e2d3b25c67d95db449b5a29bc36a2bb92cb254c2a9794720e6aaec41850fd23d9adf921ce1e99d8dfb1ccc9c8d2f04cc753eccce
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Bitman.kmx-e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715.exe
Filesize384KB
MD579535b332bdfc03f51ff90f099d1b78a
SHA116368bef8aa2b55589ec4d20c55513421ed91c98
SHA256e4269fd0f731634f3155b706ee5d00ca98b3b80197b517999d78f53bd3f81715
SHA51224524f7942ff275cafbd4677db9715128712512ae4986af74f69d00ba97e73c0fa1faec89b08c0186819d58ad1ec6531d1ecc3fe9db291871d6ade3a859057bf
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.gdri-2f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b.exe
Filesize89KB
MD57714fccf2d8f60a76f2f77ba55666437
SHA142799ab23f8199f334a001a84438a90d3dee92fb
SHA2562f3409bb36d5411d1a02ebd189c305e2b20f744c204f15eef9be459ec398448b
SHA5123d6aba025680e8f57bdc68250f5b03bad43e14d886136f7c061af274e445e5a3a6e954a3c695d434e29adafff8d14fbc2f6c3732219421db86d0debbbfadebcf
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Blocker.jouu-1a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b.exe
Filesize179KB
MD5611e378188460af33f5bdaeb969e9a42
SHA11b726244dab741d4909c01b747516df45ccbb8ba
SHA2561a2c4805fb3a6428bcd5d476a79054a35bd1c7ac838fe6639824eac0e468657b
SHA512e2f691e09aa4b9d8f5d87f812967688ca5f9dadaf55fd4b0aca75bea1452b0f5d3b6c1c2474a1a264461cd996ae5f261e6db004deab5e8c8f184035cc23745a9
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Cryakl.anq-f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5.exe
Filesize498KB
MD514011d295197f6207fb4d813eb8faf87
SHA13a651083b51896d593358ef68243f797a365412a
SHA256f24b74c9ab283b89c0a173092c5fe869651eccae96b6c7df628b958a31363ff5
SHA512674660e569ae8859955bfc478022d4a5723b8ed0d818687e05b41c0e46431324216da012f8550a37235fd20610c395460d1ac21b1d635eab7b0bc27cd75b40ca
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.giny-ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945.exe
Filesize60KB
MD5ff39a7c8614faa4ed935fc98c70abe61
SHA10bf45376b68df92ee9445441d6a3c68b68da188e
SHA256ff20937831ae585f931be8aebb0cf4cb4e56b20023310bb99f1b48b0ec75c945
SHA5123e2fd5997bcb411e95b396c0927a1bb942b347266fe3eb80fb3dd1278ecd5b8404506f1e63012799ed3941be78cc21dac9f3fd11cc2e7f25871b7d141564a690
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Foreign.ngmu-4bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca.exe
Filesize645KB
MD5bc71d446ce77809677db5e027771a049
SHA141664bb2ed8781c1b67a3870b56ed9576b9a1227
SHA2564bdb3db8fb5ffc544df21af9cc542d4aea741be78c0aeb69bc4e94a532ee14ca
SHA512c84648e5c2e0bde139f5be9cf7204d5fe7fdc93769b773e31f41153d430871eb1c622a5b3c31da94072fa925a94379f2809bbd96c9a0068e87297f4d04f3835e
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Locky.yr-3c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d.exe
Filesize114KB
MD5b64b25ecb8b7087106f5656c28004e2d
SHA1e6991557888156cd1d1aea8d27483b8dbc336dcb
SHA2563c0cf985f5fc5089419a8c5e29759466c96205ab6534140aad4e245acb5c920d
SHA51215911e03053994d6b96bc8cbee64b5a8bb81dde6fea33eddf5816f2a6cb033d258bddc368e06e1c028e6b2fcb21b64c3ff69519d5ecc269ac9410129200650b5
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Phpw.so-cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1.exe
Filesize6.7MB
MD595f7b6bab2ed4f96f7efabefd65a0c90
SHA149d7c444ace78047c5ac2a0261f86997b84793db
SHA256cfff75f7dec5d173e29c467f60612ee890f29adce5a22d22c7f7f5ac8f53d6c1
SHA512c90412072e22bbca16b93d0ec68eb71b64fbbc763fdc2c02fec0fd0c8b257a2efb408836ffa7f27c44b3ca75f9a8585e78d84ba5ff7b713f65deab0dcefa2dd2
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Purga.p-d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73.exe
Filesize170KB
MD54eacf26dedae4eb5220ab62b8cb06308
SHA1b92e8e316c09ebaf5497e2bdfd233afec38f4ba6
SHA256d59a1c9544e90afd7e70fdce1d8d7f72025143c5d2a2b85d6537dedfe4c0fe73
SHA51269dde601c9f058b5d37162ba15471e961559958bb624a4683f1b48bec9e16af4bcd523ba598f5a937641a3347ae3c19f0d6cc0671083244c1202b4c4040d1323
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Shade.yn-be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9.exe
Filesize882KB
MD5487101a3806c4448a71caaff6e3ecaf1
SHA1ccd0eb3fa95beaef0d706b3be98f7e26352a25bb
SHA256be2dc8d21f6ce018142769dda8d77b63a526ca77dbc4198635a160aa527f7ef9
SHA51287aa1d6abf9b405a9a847c3f8d6c0bb3750e85db29867a610b27848292cac03565b3825f5fc53495eea781ac55b33ced31835a1833322653e9b3b31d449dbfb3
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.gdhh-f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777.exe
Filesize212KB
MD5137f2dcee6f3fd645a1c523b19a2d30d
SHA138d3bcda8aa75a1b36735796266d214d2eb8c903
SHA256f649ee3f3068b9b00647cc1a9c44304c1f888f8895606eee24cfa83228921777
SHA512ec9a4646b546956cfd435a4669581406d7a8b71efe8b7132adf7817af5d4f9694ea794d1c0de97db724f915a3d8744986d21f2b5217b85c15b62fc11b018571b
-
C:\Users\Admin\Desktop\00268\Trojan-Ransom.Win32.Zerber.pfu-72548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f.exe
Filesize496KB
MD51b357bb6bc155d179f7d5eede82b206d
SHA1ae4a2669b00036af1d7d652f0004c145e11f78a5
SHA25672548d588dd3ed6f21f17d16b41913a513f4bd9d5a151d2fa4bbb6070ed85d7f
SHA51273218677f6526e57d621fa21a87914cc3943abb0934c3a2e80476d1047ece5706c79e385747442798917b7a18fb6e9a7284f1063ade407a62c664be3f0bb7c21