Analysis
-
max time kernel
298s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00266.7z
Resource
win10v2004-20250217-en
General
-
Target
RNSM00266.7z
-
Size
7.7MB
-
MD5
4a408bb09f401e134c4af99ccde26961
-
SHA1
1fff105007051088d0d37a39364f43788d1bdec3
-
SHA256
a2f8043138a8e52c2bfa9e1436c1f56eae6361f361db809080a9ec2e544a452e
-
SHA512
efc0133772407adc316c9985ab6ea53eefa398d174c5dd012f1e3afa48429f388b2d997d8753200445ec433df4bf4ddcbaebf9cd4290364ed68731b540c2b67d
-
SSDEEP
196608:H8fwkUsDDd65H+vQE9ggVhcs2mI2BO37bAWCt65:H8fw+fduH+IEHr1QPl5
Malware Config
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.azlto5.win/0D37-3282-9A09-0063-761E
http://cerberhhyed5frqa.xzcfr4.win/0D37-3282-9A09-0063-761E
http://cerberhhyed5frqa.asxce4.win/0D37-3282-9A09-0063-761E
http://cerberhhyed5frqa.45kgok.win/0D37-3282-9A09-0063-761E
http://cerberhhyed5frqa.ad34ft.win/0D37-3282-9A09-0063-761E
http://cerberhhyed5frqa.onion/0D37-3282-9A09-0063-761E
Extracted
C:\Recovery\WindowsRE\# DECRYPT MY FILES #.html
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Babylonrat family
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Luminosity
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
-
Luminosity family
-
Contacts a large (16409) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\\runas.exe\"" Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation conhost.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\codec.exe Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\muwxqtfdpc.vbs explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\runas.lnk Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe -
Executes dropped EXE 36 IoCs
pid Process 116 Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe 1328 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 1616 Trojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exe 1148 Trojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exe 2984 Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3620 Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe 1628 Trojan-Ransom.Win32.Blocker.jmhe-fa7d4385076a48495bb1ddbb2691964bb69bcec77515fb7b81c686dba11179a8.exe 2352 Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe 3180 Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe 2160 Trojan-Ransom.Win32.Crusis.p-3eb242f7b6497f8be2bfbee704188717562fb80e65b792285a0e797b8ca46cac.exe 4816 Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe 592 service.exe 1720 Trojan-Ransom.Win32.Foreign.ngeg-4686da1dcfbbc0ac3330d77f56d743431a5e8cc40983f99dc5dec1de6fbf2877.exe 2428 service.exe 4492 Trojan-Ransom.Win32.Locky.bim-e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2.exe 464 launcher.exe 4004 Trojan-Ransom.Win32.Purga.p-66540d2e0ffd750f23aadf78becb7b4d4572068de3ad95037075f0b08744e113.exe 1820 ba.exe 2616 svchost.exe 1392 svchost.exe 3912 conhost.exe 3028 Trojan-Ransom.Win32.Shade.oyd-c5364d56a661996a27385d91048eec42e429a900743c36938ceb683e9b39e572.exe 3332 Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe 1808 Trojan-Ransom.Win32.Zerber.fmax-65aef27df0b242923753549d5a9dad8e224b8ebf6e082145de121824eed8b887.exe 4184 ba.exe 1716 svchost.exe 2296 conhost.exe 3144 conhost.exe 1708 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 4924 runas.exe 1532 Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe 2268 svchost.exe 2304 conhost.exe -
Loads dropped DLL 15 IoCs
pid Process 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 1328 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 1328 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 1328 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 2636 Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe 4004 Trojan-Ransom.Win32.Purga.p-66540d2e0ffd750f23aadf78becb7b4d4572068de3ad95037075f0b08744e113.exe -
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5435363463 = "C:\\Users\\Admin\\AppData\\Roaming\\lm7280R0xVG1EvaiSXnKW2QxZOBa.exe" Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Rutube = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rutube\\launcher.exe\" 5000" Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon = "C:\\ProgramData\\conhost\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon = "C:\\ProgramData\\conhost\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*muwxqtfdpc = "\"C:\\Users\\Admin\\AppData\\Roaming\\muwxqtfdpc.exe\"" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon = "C:\\ProgramData\\conhost\\svchost.exe" ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon = "C:\\ProgramData\\conhost\\svchost.exe" ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon = "C:\\ProgramData\\conhost\\svchost.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon = "C:\\ProgramData\\conhost\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runas = "\"C:\\Users\\Admin\\AppData\\Roaming\\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\\runas.exe\"" Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\runas = "\"C:\\Users\\Admin\\AppData\\Roaming\\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\\runas.exe\"" Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Babylon = "C:\\ProgramData\\conhost\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\muwxqtfdpc = "\"C:\\Users\\Admin\\AppData\\Roaming\\muwxqtfdpc.exe\"" explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 72 ipinfo.io 52 myexternalip.com -
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\Hack3r = "0" Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a000000023c54-182.dat autoit_exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\Hack3r = "0" Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2984 set thread context of 3824 2984 Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe 100 PID 3824 set thread context of 4392 3824 explorer.exe 112 PID 2352 set thread context of 4516 2352 Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe 114 PID 4392 set thread context of 684 4392 RegAsm.exe 121 PID 1328 set thread context of 1708 1328 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 122 PID 3912 set thread context of 3144 3912 conhost.exe 139 -
resource yara_rule behavioral1/files/0x000c000000023cb8-441.dat upx behavioral1/memory/1392-461-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/2616-454-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/1820-451-0x0000000000CC0000-0x0000000000D89000-memory.dmp upx behavioral1/memory/1716-481-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/4184-479-0x0000000000700000-0x00000000007C9000-memory.dmp upx behavioral1/memory/3144-482-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/3144-486-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/3144-487-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2616-523-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/2268-529-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/1392-528-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/3300-555-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/1520-550-0x0000000000280000-0x0000000000349000-memory.dmp upx behavioral1/memory/4512-557-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/3028-561-0x0000000000400000-0x00000000005DA000-memory.dmp upx behavioral1/memory/6136-814-0x00000000003E0000-0x00000000004A9000-memory.dmp upx behavioral1/memory/6136-799-0x00000000003E0000-0x00000000004A9000-memory.dmp upx behavioral1/memory/5244-824-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/3288-823-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5892-1079-0x0000000000990000-0x0000000000A59000-memory.dmp upx behavioral1/memory/468-1093-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5572-1321-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5572-1332-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/3796-1550-0x0000000000CC0000-0x0000000000D89000-memory.dmp upx behavioral1/memory/5992-1556-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5300-1573-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5576-1904-0x0000000000870000-0x0000000000939000-memory.dmp upx behavioral1/memory/5576-1906-0x0000000000870000-0x0000000000939000-memory.dmp upx behavioral1/memory/3796-1910-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/3860-1913-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/1172-1929-0x00000000006C0000-0x0000000000789000-memory.dmp upx behavioral1/memory/3384-1931-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5320-1932-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/6088-1961-0x0000000000A60000-0x0000000000B29000-memory.dmp upx behavioral1/memory/4364-1972-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/4552-1973-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/3860-2029-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5716-2024-0x0000000000F90000-0x0000000001059000-memory.dmp upx behavioral1/memory/5716-2019-0x0000000000F90000-0x0000000001059000-memory.dmp upx behavioral1/memory/5780-2049-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5780-2054-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/6088-2116-0x00000000001C0000-0x0000000000289000-memory.dmp upx behavioral1/memory/6088-2124-0x00000000001C0000-0x0000000000289000-memory.dmp upx behavioral1/memory/5716-2121-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/4208-2120-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5716-2204-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/1456-2889-0x00000000001D0000-0x0000000000299000-memory.dmp upx behavioral1/memory/6408-2994-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/6304-3064-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/3404-3260-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/4068-3348-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/4980-3381-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/4980-3375-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/4068-3272-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/6324-4285-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/6784-4234-0x0000000000F90000-0x0000000001059000-memory.dmp upx behavioral1/memory/6300-5416-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/6488-6314-0x0000000000A80000-0x0000000000B49000-memory.dmp upx behavioral1/memory/6488-6319-0x0000000000A80000-0x0000000000B49000-memory.dmp upx behavioral1/memory/3684-6442-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5268-6449-0x0000000000CE0000-0x0000000000DA9000-memory.dmp upx behavioral1/memory/5744-6728-0x0000000000950000-0x0000000000A19000-memory.dmp upx behavioral1/memory/5744-6730-0x0000000000950000-0x0000000000A19000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe.inc\pdf archive\service.exe Trojan-Ransom.Win32.Crusis.p-3eb242f7b6497f8be2bfbee704188717562fb80e65b792285a0e797b8ca46cac.exe File opened for modification C:\Program Files (x86)\message\compressed info\service.exe Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe File opened for modification C:\Program Files (x86)\archive\compressed PDF\service.exe Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 3 IoCs
pid Process 4924 runas.exe 5308 runas.exe 9128 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 58 IoCs
pid pid_target Process procid_target 4660 2160 WerFault.exe 106 3456 1808 WerFault.exe 134 5628 3028 WerFault.exe 132 5844 1720 WerFault.exe 113 5244 1720 WerFault.exe 113 3288 3028 WerFault.exe 132 5388 1720 WerFault.exe 113 5188 3028 WerFault.exe 132 5780 3028 WerFault.exe 132 4428 916 WerFault.exe 108 4980 916 WerFault.exe 108 3068 916 WerFault.exe 108 5316 916 WerFault.exe 108 1880 6116 WerFault.exe 204 5504 6116 WerFault.exe 204 5268 5424 WerFault.exe 208 3272 5568 WerFault.exe 211 5708 6116 WerFault.exe 204 5320 5424 WerFault.exe 208 5936 5568 WerFault.exe 211 5588 3028 WerFault.exe 132 6380 3028 WerFault.exe 132 6552 3028 WerFault.exe 132 6520 916 WerFault.exe 108 6660 6944 WerFault.exe 290 5540 3240 WerFault.exe 293 6356 3028 WerFault.exe 132 6960 3028 WerFault.exe 132 7120 3028 WerFault.exe 132 6272 1120 WerFault.exe 278 6260 3028 WerFault.exe 132 7116 1120 WerFault.exe 278 6780 7032 WerFault.exe 375 7584 7032 WerFault.exe 375 7244 7936 WerFault.exe 518 7184 7936 WerFault.exe 518 8600 3028 WerFault.exe 132 8720 3028 WerFault.exe 132 8312 3028 WerFault.exe 132 9784 3028 WerFault.exe 132 9456 3028 WerFault.exe 132 9920 3028 WerFault.exe 132 10844 3028 WerFault.exe 132 3628 3028 Process not Found 132 6576 3028 Process not Found 132 10952 3028 Process not Found 132 12560 3028 Process not Found 132 7512 3028 Process not Found 132 8560 3028 Process not Found 132 10108 3028 Process not Found 132 14688 3028 Process not Found 132 15052 3028 Process not Found 132 456 3028 Process not Found 132 8648 3028 Process not Found 132 11504 3028 Process not Found 132 9280 3028 Process not Found 132 15224 3028 Process not Found 132 13568 3028 Process not Found 132 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jmhe-fa7d4385076a48495bb1ddbb2691964bb69bcec77515fb7b81c686dba11179a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.p-3eb242f7b6497f8be2bfbee704188717562fb80e65b792285a0e797b8ca46cac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Purga.p-66540d2e0ffd750f23aadf78becb7b4d4572068de3ad95037075f0b08744e113.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Shade.oyd-c5364d56a661996a27385d91048eec42e429a900743c36938ceb683e9b39e572.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Locky.bim-e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Foreign.ngeg-4686da1dcfbbc0ac3330d77f56d743431a5e8cc40983f99dc5dec1de6fbf2877.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.fmax-65aef27df0b242923753549d5a9dad8e224b8ebf6e082145de121824eed8b887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 9128 Process not Found 13040 Process not Found 2344 cmd.exe 1932 PING.EXE 5784 cmd.exe 5572 PING.EXE -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000a000000023c4d-46.dat nsis_installer_1 behavioral1/files/0x000a000000023c4d-46.dat nsis_installer_2 behavioral1/files/0x000a000000023c4e-48.dat nsis_installer_1 behavioral1/files/0x000a000000023c4e-48.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3860 vssadmin.exe -
Kills process with taskkill 3 IoCs
pid Process 12340 Process not Found 3844 taskkill.exe 5768 taskkill.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\PowerCfg Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\Desktop Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\\runas.exe\"" Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 040000000100000010000000cb17e431673ee209fe455793f30afa1c0f0000000100000014000000e91e1e972b8f467ab4e0598fa92285387dee94c953000000010000006300000030613021060b6086480186f8450107170630123010060a2b0601040182373c0101030200c0301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c07f000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030109000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703016200000001000000200000009acfab7e43c8d880d06b262a94deeee4b4659989c3d0caf19baf6405e41ab7df1400000001000000140000007fd365a7c2ddecbbf03009f34339fa02af3331330b000000010000001200000056006500720069005300690067006e0000001d0000000100000010000000c6cbcafa17955c4cfd41eca0c654c3617e000000010000000800000000c0032f2df8d6016800000001000000000000000300000001000000140000004eb6d578499b1ccf5f581ead56be3d9b6744a5e5190000000100000010000000d8b5fb368468620275d142ffd2aade372000000001000000d7040000308204d3308203bba003020102021018dad19e267de8bb4a2158cdcc6b3b4a300d06092a864886f70d01010505003081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735301e170d3036313130383030303030305a170d3336303731363233353935395a3081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d20473530820122300d06092a864886f70d01010105000382010f003082010a0282010100af240808297a359e600caae74b3b4edc7cbc3c451cbb2be0fe2902f95708a364851527f5f1adc831895d22e82aaaa642b38ff8b955b7b1b74bb3fe8f7e0757ecef43db66621561cf600da4d8def8e0c362083d5413eb49ca59548526e52b8f1b9febf5a191c23349d843636a524bd28fe870514dd189697bc770f6b3dc1274db7b5d4b56d396bf1577a1b0f4a225f2af1c926718e5f40604ef90b9e400e4dd3ab519ff02baf43ceee08beb378becf4d7acf2f6f03dafdd759133191d1c40cb7424192193d914feac2a52c78fd50449e48d6347883c6983cbfe47bd2b7e4fc595ae0e9dd4d143c06773e314087ee53f9f73b8330acf5d3f3487968aee53e825150203010001a381b23081af300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106306d06082b0601050507010c0461305fa15da05b3059305730551609696d6167652f6769663021301f300706052b0e03021a04148fe5d31a86ac8d8e6bc3cf806ad448182c7b192e30251623687474703a2f2f6c6f676f2e766572697369676e2e636f6d2f76736c6f676f2e676966301d0603551d0e041604147fd365a7c2ddecbbf03009f34339fa02af333133300d06092a864886f70d0101050500038201010093244a305f62cfd81a982f3deadc992dbd77f6a5792238ecc4a7a07812ad620e457064c5e797662d98097e5fafd6cc2865f201aa081a47def9f97c925a0869200dd93e6d6e3c0d6ed8e606914018b9f8c1eddfdb41aae09620c9cd64153881c994eea284290b136f8edb0cdd2502dba48b1944d2417a05694a584f60ca7e826a0b02aa251739b5db7fe784652a958abd86de5e8116832d10ccdefda8822a6d281f0d0bc4e5e71a2619e1f4116f10b595fce7420532dbce9d515e28b69e85d35befa57d4540728eb70e6b0e06fb33354871b89d278bc4655f0d86769c447af6955cf65d320833a454b6183f685cf2424a853854835fd1e82cf2ac11d6a8ed636a Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 5c000000010000000400000000080000190000000100000010000000d8b5fb368468620275d142ffd2aade370300000001000000140000004eb6d578499b1ccf5f581ead56be3d9b6744a5e56800000001000000000000007e000000010000000800000000c0032f2df8d6011d0000000100000010000000c6cbcafa17955c4cfd41eca0c654c3610b000000010000001200000056006500720069005300690067006e0000001400000001000000140000007fd365a7c2ddecbbf03009f34339fa02af3331336200000001000000200000009acfab7e43c8d880d06b262a94deeee4b4659989c3d0caf19baf6405e41ab7df09000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703017f000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030153000000010000006300000030613021060b6086480186f8450107170630123010060a2b0601040182373c0101030200c0301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e91e1e972b8f467ab4e0598fa92285387dee94c9040000000100000010000000cb17e431673ee209fe455793f30afa1c2000000001000000d7040000308204d3308203bba003020102021018dad19e267de8bb4a2158cdcc6b3b4a300d06092a864886f70d01010505003081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735301e170d3036313130383030303030305a170d3336303731363233353935395a3081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d20473530820122300d06092a864886f70d01010105000382010f003082010a0282010100af240808297a359e600caae74b3b4edc7cbc3c451cbb2be0fe2902f95708a364851527f5f1adc831895d22e82aaaa642b38ff8b955b7b1b74bb3fe8f7e0757ecef43db66621561cf600da4d8def8e0c362083d5413eb49ca59548526e52b8f1b9febf5a191c23349d843636a524bd28fe870514dd189697bc770f6b3dc1274db7b5d4b56d396bf1577a1b0f4a225f2af1c926718e5f40604ef90b9e400e4dd3ab519ff02baf43ceee08beb378becf4d7acf2f6f03dafdd759133191d1c40cb7424192193d914feac2a52c78fd50449e48d6347883c6983cbfe47bd2b7e4fc595ae0e9dd4d143c06773e314087ee53f9f73b8330acf5d3f3487968aee53e825150203010001a381b23081af300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106306d06082b0601050507010c0461305fa15da05b3059305730551609696d6167652f6769663021301f300706052b0e03021a04148fe5d31a86ac8d8e6bc3cf806ad448182c7b192e30251623687474703a2f2f6c6f676f2e766572697369676e2e636f6d2f76736c6f676f2e676966301d0603551d0e041604147fd365a7c2ddecbbf03009f34339fa02af333133300d06092a864886f70d0101050500038201010093244a305f62cfd81a982f3deadc992dbd77f6a5792238ecc4a7a07812ad620e457064c5e797662d98097e5fafd6cc2865f201aa081a47def9f97c925a0869200dd93e6d6e3c0d6ed8e606914018b9f8c1eddfdb41aae09620c9cd64153881c994eea284290b136f8edb0cdd2502dba48b1944d2417a05694a584f60ca7e826a0b02aa251739b5db7fe784652a958abd86de5e8116832d10ccdefda8822a6d281f0d0bc4e5e71a2619e1f4116f10b595fce7420532dbce9d515e28b69e85d35befa57d4540728eb70e6b0e06fb33354871b89d278bc4655f0d86769c447af6955cf65d320833a454b6183f685cf2424a853854835fd1e82cf2ac11d6a8ed636a Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 7636 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1932 PING.EXE 5572 PING.EXE 13040 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe 116 Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe 4392 RegAsm.exe 4392 RegAsm.exe 4516 explorer.exe 4516 explorer.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 1708 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 1708 Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe 3912 conhost.exe 3912 conhost.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe 3912 conhost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2984 Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe 2352 Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 220 7zFM.exe Token: 35 220 7zFM.exe Token: SeSecurityPrivilege 220 7zFM.exe Token: SeDebugPrivilege 116 Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe Token: SeDebugPrivilege 3824 explorer.exe Token: SeDebugPrivilege 4392 RegAsm.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeShutdownPrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe Token: SeCreatePagefilePrivilege 916 Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 220 7zFM.exe 220 7zFM.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1616 Trojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exe 1148 Trojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exe 2616 svchost.exe 3668 Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe 1532 Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 116 5008 cmd.exe 93 PID 5008 wrote to memory of 116 5008 cmd.exe 93 PID 5008 wrote to memory of 1328 5008 cmd.exe 94 PID 5008 wrote to memory of 1328 5008 cmd.exe 94 PID 5008 wrote to memory of 1328 5008 cmd.exe 94 PID 5008 wrote to memory of 2636 5008 cmd.exe 95 PID 5008 wrote to memory of 2636 5008 cmd.exe 95 PID 5008 wrote to memory of 2636 5008 cmd.exe 95 PID 5008 wrote to memory of 1616 5008 cmd.exe 96 PID 5008 wrote to memory of 1616 5008 cmd.exe 96 PID 5008 wrote to memory of 1616 5008 cmd.exe 96 PID 5008 wrote to memory of 1148 5008 cmd.exe 97 PID 5008 wrote to memory of 1148 5008 cmd.exe 97 PID 5008 wrote to memory of 1148 5008 cmd.exe 97 PID 5008 wrote to memory of 2984 5008 cmd.exe 98 PID 5008 wrote to memory of 2984 5008 cmd.exe 98 PID 5008 wrote to memory of 2984 5008 cmd.exe 98 PID 5008 wrote to memory of 3668 5008 cmd.exe 99 PID 5008 wrote to memory of 3668 5008 cmd.exe 99 PID 5008 wrote to memory of 3668 5008 cmd.exe 99 PID 2984 wrote to memory of 3824 2984 Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe 100 PID 2984 wrote to memory of 3824 2984 Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe 100 PID 2984 wrote to memory of 3824 2984 Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe 100 PID 5008 wrote to memory of 3620 5008 cmd.exe 101 PID 5008 wrote to memory of 3620 5008 cmd.exe 101 PID 5008 wrote to memory of 3620 5008 cmd.exe 101 PID 5008 wrote to memory of 1628 5008 cmd.exe 102 PID 5008 wrote to memory of 1628 5008 cmd.exe 102 PID 5008 wrote to memory of 1628 5008 cmd.exe 102 PID 5008 wrote to memory of 2352 5008 cmd.exe 104 PID 5008 wrote to memory of 2352 5008 cmd.exe 104 PID 5008 wrote to memory of 2352 5008 cmd.exe 104 PID 5008 wrote to memory of 3180 5008 cmd.exe 105 PID 5008 wrote to memory of 3180 5008 cmd.exe 105 PID 5008 wrote to memory of 3180 5008 cmd.exe 105 PID 5008 wrote to memory of 2160 5008 cmd.exe 106 PID 5008 wrote to memory of 2160 5008 cmd.exe 106 PID 5008 wrote to memory of 2160 5008 cmd.exe 106 PID 5008 wrote to memory of 4816 5008 cmd.exe 107 PID 5008 wrote to memory of 4816 5008 cmd.exe 107 PID 5008 wrote to memory of 4816 5008 cmd.exe 107 PID 5008 wrote to memory of 916 5008 cmd.exe 108 PID 5008 wrote to memory of 916 5008 cmd.exe 108 PID 5008 wrote to memory of 916 5008 cmd.exe 108 PID 3180 wrote to memory of 592 3180 Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe 111 PID 3180 wrote to memory of 592 3180 Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe 111 PID 3180 wrote to memory of 592 3180 Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe 111 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 3824 wrote to memory of 4392 3824 explorer.exe 112 PID 5008 wrote to memory of 1720 5008 cmd.exe 113 PID 5008 wrote to memory of 1720 5008 cmd.exe 113 PID 5008 wrote to memory of 1720 5008 cmd.exe 113 PID 2352 wrote to memory of 4516 2352 Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe 114 PID 2352 wrote to memory of 4516 2352 Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe 114 PID 2352 wrote to memory of 4516 2352 Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe 114 PID 4816 wrote to memory of 2428 4816 Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe 116 PID 4816 wrote to memory of 2428 4816 Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe 116
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00266.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:220
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\Desktop\00267\Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exeTrojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe2⤵
- Executes dropped EXE
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exeTrojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Users\Admin\Desktop\00267\Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exeTrojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exeTrojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Users\Admin\AppData\Roaming\Rutube\launcher.exe"C:\Users\Admin\AppData\Roaming\Rutube\launcher.exe" 288000003⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:464
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exeTrojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exeTrojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exe3⤵PID:876
-
C:\Windows\aswovbsfkakm.exeC:\Windows\aswovbsfkakm.exe4⤵PID:1716
-
C:\Windows\aswovbsfkakm.exeC:\Windows\aswovbsfkakm.exe5⤵PID:6944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6944 -s 6406⤵
- Program crash
PID:6660
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00267\TROJAN~4.EXE4⤵PID:2476
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"5⤵PID:5424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5424 -s 9006⤵
- Program crash
PID:5268
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs6⤵PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5424 -s 1566⤵
- Program crash
PID:5320
-
-
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exeTrojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exeTrojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exe3⤵PID:4628
-
C:\Windows\lswovbsfkakm.exeC:\Windows\lswovbsfkakm.exe4⤵PID:6076
-
C:\Windows\lswovbsfkakm.exeC:\Windows\lswovbsfkakm.exe5⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 6966⤵
- Program crash
PID:5540
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00267\TRAA39~1.EXE4⤵PID:5356
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"5⤵PID:5568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5568 -s 9086⤵
- Program crash
PID:3272
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs6⤵PID:4092
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs6⤵PID:5764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5568 -s 1566⤵
- Program crash
PID:5936
-
-
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exeTrojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" "C:\Users\Admin\AppData\Roaming\muwxqtfdpc.exe" uxEaFIKILD ECngfnflda4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" "C:\Users\Admin\AppData\Roaming\muwxqtfdpc.exe" uxEaFIKILD ECngfnflda5⤵PID:3556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" "C:\Users\Admin\AppData\Roaming\muwxqtfdpc.exe" uxEaFIKILD ECngfnflda5⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exeTrojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3668 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc onlogon /tn "LuminosityLink" /rl highest /tr "'C:\ProgramData\765436\Luminosity.exe' /startup" /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5536
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exeTrojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:3620 -
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1820 -
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe" 26165⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:10524
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"7⤵PID:10860
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:9684
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:5696
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:324
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3912 -
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4184 -
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵
- Executes dropped EXE
PID:2296
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3144 -
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2268
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:1520
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:3300
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:3836
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:4512
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:3360
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:6136
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:3288
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:5160
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:5244
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:5224
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"7⤵PID:5892
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:468
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:1860
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:5572
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:5464
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"8⤵PID:3796
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:5992
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:6040
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:1748
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:5300
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:1192
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"9⤵PID:5576
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:3796
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:3636
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:3860
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:5188
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"10⤵PID:1172
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:3384
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:5124
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:5320
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:6100
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"11⤵PID:6088
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:4364
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:4532
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:5108
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:1172
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:4552
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:3464
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"12⤵PID:5716
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"13⤵PID:3860
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"12⤵PID:5336
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"13⤵PID:5780
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"12⤵PID:6100
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"13⤵PID:6088
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"14⤵PID:4208
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"13⤵PID:4084
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"14⤵PID:5716
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"13⤵PID:6420
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"14⤵PID:1456
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"15⤵PID:6304
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:5712
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"15⤵PID:6408
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:3752
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"15⤵PID:3404
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"16⤵PID:4068
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"15⤵PID:6532
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"16⤵PID:4980
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"15⤵PID:6348
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"16⤵PID:6784
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"17⤵PID:6324
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:6344
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:6392
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:1104
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"17⤵PID:6300
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:6480
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"17⤵PID:6488
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"18⤵PID:3684
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"17⤵PID:3252
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"18⤵PID:5268
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"17⤵PID:7068
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"18⤵PID:6772
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"19⤵PID:456
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"18⤵PID:6192
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"19⤵PID:3560
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"18⤵PID:5080
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"19⤵PID:6664
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"20⤵PID:2400
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"19⤵PID:456
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"20⤵PID:6980
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"19⤵PID:4676
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"20⤵PID:6400
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"21⤵PID:6852
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"20⤵PID:7096
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"20⤵PID:1332
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"21⤵PID:6684
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"20⤵PID:8628
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"21⤵PID:7216
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"22⤵PID:7460
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:6420
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:8060
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:5176
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"22⤵PID:8524
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:8904
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"22⤵PID:7396
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"23⤵PID:8204
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"22⤵PID:6936
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"22⤵PID:7412
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"23⤵PID:7928
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"22⤵PID:7084
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"23⤵PID:6152
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"24⤵PID:8444
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"23⤵PID:5736
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"24⤵PID:7748
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"23⤵PID:5964
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"24⤵PID:7248
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"25⤵PID:8492
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"24⤵PID:5912
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"25⤵PID:8956
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"24⤵PID:9076
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"25⤵PID:8204
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"26⤵PID:9088
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"25⤵PID:7956
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"26⤵PID:7756
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"25⤵PID:8724
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"26⤵PID:8732
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"27⤵PID:7244
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"26⤵PID:7084
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"27⤵PID:7928
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"26⤵PID:8660
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"27⤵PID:3340
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"28⤵PID:7032
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"27⤵PID:5392
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"28⤵PID:8732
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"27⤵PID:7556
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"28⤵PID:7880
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"29⤵PID:1520
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"28⤵PID:5352
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"29⤵PID:7628
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"28⤵PID:8852
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"29⤵PID:8444
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"30⤵PID:7524
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"29⤵PID:9028
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"30⤵PID:8952
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"29⤵PID:8116
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"30⤵PID:6152
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"31⤵PID:7820
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"30⤵PID:9080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.jmhe-fa7d4385076a48495bb1ddbb2691964bb69bcec77515fb7b81c686dba11179a8.exeTrojan-Ransom.Win32.Blocker.jmhe-fa7d4385076a48495bb1ddbb2691964bb69bcec77515fb7b81c686dba11179a8.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exeTrojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exeTrojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\archive\compressed PDF\service.exe"C:\Program Files (x86)\archive\compressed PDF\service.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:592 -
C:\Program Files (x86)\archive\compressed PDF\service.exe"C:\Program Files (x86)\archive\compressed PDF\service.exe"4⤵PID:1228
-
-
C:\Program Files (x86)\archive\compressed PDF\service.exe"C:\Program Files (x86)\archive\compressed PDF\service.exe"4⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"5⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"6⤵PID:5428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MLSVL.bat" "7⤵PID:9132
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"8⤵PID:7936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7936 -s 9289⤵
- Program crash
PID:7244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7936 -s 1529⤵
- Program crash
PID:7184
-
-
-
C:\Windows\SysWOW64\chcp.comchcp 12518⤵PID:7884
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Crusis.p-3eb242f7b6497f8be2bfbee704188717562fb80e65b792285a0e797b8ca46cac.exeTrojan-Ransom.Win32.Crusis.p-3eb242f7b6497f8be2bfbee704188717562fb80e65b792285a0e797b8ca46cac.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 9123⤵
- Program crash
PID:4660
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exeTrojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6512
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7088
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5468
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6584
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4844
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6592
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6444
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5748
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6380
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6948
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6696
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6744
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6672
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6896
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6876
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6812
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6792
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7128
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6180
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6456
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6884
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6740
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5792
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5756
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6916
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6432
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6572
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:2692
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6500
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4816
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5188
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6636
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6196
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5716
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6476
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4364
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6844
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6760
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7156
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5204
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6920
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7092
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1228
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5580
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6184
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6552
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:2528
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6764
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6660
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1960
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6148
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7012
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:816
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1108
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5136
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6856
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6088
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7144
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5540
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4720
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4104
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5976
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6608
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6340
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5356
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5672
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6412
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6416
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6536
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6084
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6604
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6860
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5296
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5784
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3800
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4824
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7164
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6596
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1668
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1524
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6392
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:292
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6944
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:516
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7116
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7048
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6488
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3384
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6532
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5048
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5744
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:316
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7152
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6032
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3348
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5804
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5420
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5900
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5992
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4812
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5268
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6600
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1616
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4372
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6404
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5408
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6096
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5760
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6272
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5240
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7376
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7872
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8128
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7180
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8620
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9052
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9140
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7688
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1480
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8320
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8612
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7028
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7508
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8396
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8548
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8000
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8804
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6804
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8672
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8828
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8876
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7096
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9008
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9092
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1776
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9100
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6348
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6652
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7788
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7220
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8364
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4056
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8752
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8792
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8772
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7192
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7464
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6664
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8884
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9068
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9192
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6256
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8532
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7976
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7076
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8356
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:2416
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8800
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8340
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9064
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6428
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8296
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8652
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7912
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8140
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7692
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:2220
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6556
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3424
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6732
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8860
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8984
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6396
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8864
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7808
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9048
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7384
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3936
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4424
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7844
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7424
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7980
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7288
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:764
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8836
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7700
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7656
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7836
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7676
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7960
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6176
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8228
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7904
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7756
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8204
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9112
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7448
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4596
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3488
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7452
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3924
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7720
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:2548
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7728
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9156
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3328
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6480
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5668
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6460
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:620
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7084
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4652
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8208
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6360
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8732
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8748
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4548
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8608
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8468
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7600
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9176
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7564
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7852
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8164
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5160
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8044
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8404
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7988
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7900
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7552
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5788
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5924
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9024
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7972
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7176
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4888
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7524
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4620
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9088
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8928
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:6960
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8348
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9020
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7768
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8968
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7704
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5592
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8020
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8908
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5352
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:5892
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9148
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7672
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3832
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7216
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8388
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7572
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8700
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:2332
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:7584
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8744
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8816
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9448
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9704
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9796
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9880
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10048
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9436
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8972
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9868
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9936
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9300
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9608
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9724
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:8308
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9952
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10168
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9428
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:2176
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10236
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4284
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:1812
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:848
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:4008
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9632
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9972
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10864
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10424
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10624
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3640
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10564
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3952
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:9624
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10820
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10680
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:10884
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:11136
-
-
C:\Program Files (x86)\message\compressed info\service.exe"C:\Program Files (x86)\message\compressed info\service.exe"4⤵PID:3812
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exeTrojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 7003⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 6843⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 8483⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 8683⤵
- Program crash
PID:5316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 1523⤵
- Program crash
PID:6520
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Foreign.ngeg-4686da1dcfbbc0ac3330d77f56d743431a5e8cc40983f99dc5dec1de6fbf2877.exeTrojan-Ransom.Win32.Foreign.ngeg-4686da1dcfbbc0ac3330d77f56d743431a5e8cc40983f99dc5dec1de6fbf2877.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 9483⤵
- Program crash
PID:5844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 9763⤵
- Program crash
PID:5244
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs3⤵PID:5700
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe" "C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Foreign.ngeg-4686da1dcfbbc0ac3330d77f56d743431a5e8cc40983f99dc5dec1de6fbf2877.exe"4⤵PID:6116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 9365⤵
- Program crash
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 10005⤵
- Program crash
PID:5504
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs5⤵PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 1405⤵
- Program crash
PID:5708
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 1523⤵
- Program crash
PID:5388
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Locky.bim-e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2.exeTrojan-Ransom.Win32.Locky.bim-e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Locky.bim-e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2.exe"C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Locky.bim-e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2.exe"3⤵PID:5272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5DAC\2ED6.bat" "C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe" "C:\Users\Admin\Desktop\00267\TRA992~1.EXE""4⤵PID:6116
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"5⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9086⤵
- Program crash
PID:6272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1566⤵
- Program crash
PID:7116
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe" "C:\Users\Admin\Desktop\00267\TRA992~1.EXE""5⤵PID:6024
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dllcache\odbcconf.exe"6⤵PID:7032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7032 -s 10487⤵
- Program crash
PID:6780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7032 -s 1567⤵
- Program crash
PID:7584
-
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe" "C:\Users\Admin\Desktop\00267\TRA992~1.EXE"6⤵PID:8996
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:6640
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:6448
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:5484
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:7820
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:6936
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9136
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:8688
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:5276
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:6720
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:5480
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:3720
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:7316
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:5736
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:5772
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9320
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9568
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9772
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9904
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10060
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9108
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:6216
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10004
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9372
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9404
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:7008
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9540
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9832
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:5360
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9296
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9228
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:2492
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:4240
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10156
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:1888
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9352
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9648
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9400
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:3740
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10812
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:11220
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10416
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10700
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10296
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9580
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10100
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:3656
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10756
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:10408
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9516
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9388
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:9664
-
-
C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"C:\Users\Admin\AppData\Roaming\AarSetry\appiging.exe"7⤵PID:3788
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Purga.p-66540d2e0ffd750f23aadf78becb7b4d4572068de3ad95037075f0b08744e113.exeTrojan-Ransom.Win32.Purga.p-66540d2e0ffd750f23aadf78becb7b4d4572068de3ad95037075f0b08744e113.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4004
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Shade.oyd-c5364d56a661996a27385d91048eec42e429a900743c36938ceb683e9b39e572.exeTrojan-Ransom.Win32.Shade.oyd-c5364d56a661996a27385d91048eec42e429a900743c36938ceb683e9b39e572.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 10803⤵
- Program crash
PID:5628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 11843⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12243⤵
- Program crash
PID:5188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12603⤵
- Program crash
PID:5780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 6563⤵
- Program crash
PID:5588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 6563⤵
- Program crash
PID:6380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12163⤵
- Program crash
PID:6552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12683⤵
- Program crash
PID:6356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12523⤵
- Program crash
PID:6960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12843⤵
- Program crash
PID:7120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12203⤵
- Program crash
PID:6260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12643⤵
- Program crash
PID:8600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 10043⤵
- Program crash
PID:8720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 11883⤵
- Program crash
PID:8312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 8283⤵
- Program crash
PID:9784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 10683⤵
- Program crash
PID:9456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 12203⤵
- Program crash
PID:9920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 13443⤵
- Program crash
PID:10844
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exeTrojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:3332 -
C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\runas.exe"C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\runas.exe"3⤵
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3860
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete4⤵PID:1880
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:392
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:5744
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:7080
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:5804
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:2220
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:6984
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:6720
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:6560
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:6984
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:6316
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:3216
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:7104
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"7⤵PID:5560
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:5620
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:2304
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:6984
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:8076
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:7244
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"8⤵PID:6268
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:7788
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:7888
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:5604
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:8888
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"9⤵PID:8016
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:8340
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:7592
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:8468
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:8768
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:8580
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"10⤵PID:9048
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:9168
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:7984
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:6480
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:8012
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"11⤵PID:5664
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:4676
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:5592
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:1560
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:5496
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:8812
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"12⤵PID:7552
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"13⤵PID:8868
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"12⤵PID:9128
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"12⤵PID:8264
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"13⤵PID:5568
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"12⤵PID:7972
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"13⤵PID:5428
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"14⤵PID:8712
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"13⤵PID:8972
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"13⤵PID:8444
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"14⤵PID:9096
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"13⤵PID:7804
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"14⤵PID:7008
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"15⤵PID:7240
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:7964
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:7200
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:9152
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"15⤵PID:7004
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:8084
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"15⤵PID:6152
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"16⤵PID:9096
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"15⤵PID:3340
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"16⤵PID:8644
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"15⤵PID:7740
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"16⤵PID:8388
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"17⤵PID:4076
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:7760
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"17⤵PID:9152
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:5244
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"17⤵PID:3616
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"18⤵PID:6820
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"17⤵PID:8788
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"18⤵PID:9168
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"17⤵PID:7608
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"18⤵PID:8708
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"19⤵PID:5576
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"18⤵PID:5552
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"19⤵PID:6268
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"18⤵PID:7584
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"19⤵PID:7680
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"20⤵PID:8308
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"19⤵PID:8844
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"20⤵PID:8900
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"19⤵PID:7832
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"20⤵PID:7880
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"21⤵PID:9236
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"20⤵PID:9248
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"21⤵PID:9304
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"20⤵PID:9584
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"21⤵PID:6308
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"22⤵PID:2448
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:9816
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"22⤵PID:9956
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:2008
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"22⤵PID:5436
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"23⤵PID:10324
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"22⤵PID:10568
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"23⤵PID:10652
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"22⤵PID:11188
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"23⤵PID:5832
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"24⤵PID:11004
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"23⤵PID:10740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:6508
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:7684
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:7812
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:7860
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:7888
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:8004
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:7176
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:8056
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:6308
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:8016
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:7904
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:6708
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"7⤵PID:5736
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:7564
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:7768
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:8516
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:7952
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"8⤵PID:9108
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:1748
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:5780
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:1520
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:5488
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:9204
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:7296
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"9⤵PID:5772
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:5352
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:9188
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:8196
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:8900
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"10⤵PID:7556
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:7500
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:7904
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:9020
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:7908
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:7948
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:8300
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:7188
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"11⤵PID:4076
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:5876
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:8768
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:7780
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:4656
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"12⤵PID:8908
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"13⤵PID:8780
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"12⤵PID:3416
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"13⤵PID:6364
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"12⤵PID:9040
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"13⤵PID:5772
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"14⤵PID:8540
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"13⤵PID:8380
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"14⤵PID:5348
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"13⤵PID:8924
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"14⤵PID:296
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"15⤵PID:3040
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:4048
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"15⤵PID:7052
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"14⤵PID:4756
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"15⤵PID:7628
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"16⤵PID:5592
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"15⤵PID:9148
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"15⤵PID:7140
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"16⤵PID:9096
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"15⤵PID:8972
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"16⤵PID:7356
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"17⤵PID:5876
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:7888
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"17⤵PID:8632
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"16⤵PID:9108
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"17⤵PID:4048
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"18⤵PID:9128
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"17⤵PID:1560
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"18⤵PID:7200
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"17⤵PID:2384
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"18⤵PID:9152
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"19⤵PID:7888
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"18⤵PID:6372
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"19⤵PID:4756
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"18⤵PID:8872
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"19⤵PID:10084
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"20⤵PID:10140
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"19⤵PID:10120
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"19⤵PID:5604
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"20⤵PID:7832
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"19⤵PID:7200
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"20⤵PID:4368
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"21⤵PID:9084
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"20⤵PID:9588
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"21⤵PID:5952
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"20⤵PID:10428
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"21⤵PID:9944
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"22⤵PID:4496
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:10976
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"22⤵PID:3264
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"21⤵PID:3004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:5736
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:2644
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:8588
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:8780
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:8196
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9036
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:1332
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:2092
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:8300
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:8952
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:1672
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"7⤵PID:9136
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:6364
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:8708
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:6560
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:6264
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"8⤵PID:7200
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:6308
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:8788
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"9⤵PID:5436
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"8⤵PID:9576
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"9⤵PID:10100
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:9272
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:3812
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"10⤵PID:2536
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"9⤵PID:1604
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"10⤵PID:10924
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:11048
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:11208
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"11⤵PID:5952
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"10⤵PID:9984
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"11⤵PID:9596
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:10732
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:10608
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"12⤵PID:5096
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"11⤵PID:11100
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:5148
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:1520
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:8628
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9316
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:9360
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9460
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:1172
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:10176
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:4136
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:5604
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:2064
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:9916
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:9564
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:1332
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:2148
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9940
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:5096
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:10136
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:5108
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:10888
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:11000
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:11176
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:11232
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:3164
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:10616
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"7⤵PID:10044
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:5640
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:10972
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"8⤵PID:4288
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"7⤵PID:10436
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:1560
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:1880
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:10116
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9676
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:10596
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:10008
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:9668
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:10488
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:5380
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:9824
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:11072
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:11108
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:9592
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:6976
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:10116
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9920
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:9548
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:10668
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:10952
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:10904
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:9412
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:9676
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:11160
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:10480
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:8904
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:5932
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:8160
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:4476
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9780
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:3760
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:3760
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:224
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:980
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:5348
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:10528
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:10772
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:10924
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:7680
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:10176
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:3788
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:3132
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:2064
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:10688
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:712
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:10544
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:10860
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:9520
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:9544
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:11084
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:1004
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:10772
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:10932
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:10900
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:11020
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:3788
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"6⤵PID:5828
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:3048
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:9896
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"7⤵PID:3280
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"6⤵PID:11156
-
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:9684
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:3952
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:10748
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:10820
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:4416
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:4280
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:11044
-
C:\Users\Admin\AppData\Roaming\ba.exe"C:\Users\Admin\AppData\Roaming\ba.exe"5⤵PID:9272
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:5404
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:9668
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:1612
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:10488
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:5824
-
C:\ProgramData\conhost\svchost.exe"C:\ProgramData\conhost\svchost.exe"6⤵PID:9364
-
-
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"5⤵PID:5656
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html4⤵PID:9728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb3ba946f8,0x7ffb3ba94708,0x7ffb3ba947185⤵PID:11032
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt4⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.azlto5.win/0D37-3282-9A09-0063-761E4⤵PID:2536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3ba946f8,0x7ffb3ba94708,0x7ffb3ba947185⤵PID:3212
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"4⤵PID:10976
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2344 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.dhg-279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f.exe"4⤵
- Kills process with taskkill
PID:3844
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1932
-
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Zerber.fmax-65aef27df0b242923753549d5a9dad8e224b8ebf6e082145de121824eed8b887.exeTrojan-Ransom.Win32.Zerber.fmax-65aef27df0b242923753549d5a9dad8e224b8ebf6e082145de121824eed8b887.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 4083⤵
- Program crash
PID:3456
-
-
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exeTrojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exeTrojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe3⤵PID:5208
-
C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\runas.exe"C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\runas.exe"4⤵
- Access Token Manipulation: Create Process with Token
PID:5308
-
-
C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\autochk.exe"C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\autochk.exe"4⤵PID:6008
-
C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\autochk.exe"C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\autochk.exe"5⤵PID:3616
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe" > NUL4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5784 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "Trojan-Ransom.Win32.Zerber.gdlr-4bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268.exe"5⤵
- Kills process with taskkill
PID:5768
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5572
-
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2160 -ip 21601⤵PID:4524
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x494 0x2c01⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1808 -ip 18081⤵PID:2268
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3440
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1036
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:5292
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵PID:5852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3028 -ip 30281⤵PID:5440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1720 -ip 17201⤵PID:5704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1720 -ip 17201⤵PID:6012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3028 -ip 30281⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1720 -ip 17201⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 3028 -ip 30281⤵PID:5872
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3028 -ip 30281⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 916 -ip 9161⤵PID:5336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 916 -ip 9161⤵PID:5316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 916 -ip 9161⤵PID:6120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 916 -ip 9161⤵PID:5516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6116 -ip 61161⤵PID:3752
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6116 -ip 61161⤵PID:5280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5424 -ip 54241⤵PID:6096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5568 -ip 55681⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6116 -ip 61161⤵PID:5824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 5424 -ip 54241⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5568 -ip 55681⤵PID:5316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3028 -ip 30281⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3028 -ip 30281⤵PID:5356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3028 -ip 30281⤵PID:7092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 916 -ip 9161⤵PID:7104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 6944 -ip 69441⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3240 -ip 32401⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3028 -ip 30281⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3028 -ip 30281⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3028 -ip 30281⤵PID:5496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1120 -ip 11201⤵PID:6960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3028 -ip 30281⤵PID:6824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1120 -ip 11201⤵PID:5584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 7032 -ip 70321⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 7032 -ip 70321⤵PID:1120
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:7636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 7936 -ip 79361⤵PID:9004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 7936 -ip 79361⤵PID:7920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:8332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3028 -ip 30281⤵PID:6824
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\{29BB9C33-3AF5-6FE1-55F6-B9BB08A9B150}\README.txt1⤵PID:5360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3028 -ip 30281⤵PID:5576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3028 -ip 30281⤵PID:5436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3028 -ip 30281⤵PID:9532
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3028 -ip 30281⤵PID:10196
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:9912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3028 -ip 30281⤵PID:980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3028 -ip 30281⤵PID:5444
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:11068
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:10732
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Direct Volume Access
1Hide Artifacts
1Hidden Users
1Indicator Removal
3File Deletion
3Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD5ee37124028b7682a4e2be918836afad5
SHA176169cf6a66b87bb805d1bdc6055c6e9f528cee7
SHA2562cb9e8438c33aea67fb5e098531f7e74adf5fe63d42f02ff76f11bb9fc97c3fc
SHA5124c4ecdc95591e0e8a497f5261381abfd30258b2885bca09ea8696be05ba4ced87586e011fee50fcb4eadebccda79cbf6be669d46a0ac12b899322283a3fcd3b5
-
Filesize
724KB
MD5c0df95efe81a5a4127ae9fe2b8334750
SHA112ea836ed2a577ddaebbf9dd3f67a0beb920416f
SHA25622576e4309d111db979291656e683fe937b03ec2e72c43968fe18e6e48f7f051
SHA5127dd06d0c3bca57b704e7d9c92cdb9fbc0395237b35f2d666b0e13609da352cfba3d845a7480364fee9dde0b67fe3dfda6fedf12db33167c898f98ac97a6e077c
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_120234\[email protected] 1.3.1.0.id-VLBMJFAUQLFBUQMHCXTNIEXTPKGAWRMHDYTR-2@24@2025 11@01@35 PM8577786@@@@@BB31-2DDF.randomname-HAYFEICWRIAQIYQIZXOGXVKCTLBTLJ.KDB.xiw
Filesize22KB
MD59239380e09dc38d01b250e105e1399ef
SHA197dd42531d945b42c75f42986c5e1c4e4232b318
SHA2569853572a6e7e1809162ab11fdcbae8fa758830568afb17b9bff7515a09f8df85
SHA512b8f63b0e30728f1169e69d2e2e62a4f8ea7a160a8a1d002922ca4a74055306551ed4ef37e678f561b8ea95bb1f4b30e98d40142c00f4905e1946ef4d9865e0db
-
Filesize
358KB
MD5a239322988249c04a94bfee41a930e79
SHA17a526ae8e8534da713c9104c3288171445b11977
SHA25626d90009b89d21c0ff3bc236dcf0c2a2128f28149b22d311b43e1b92da77176b
SHA5126b52d57811587427bb80c1b61431eab3a079f7b50cc08932584bb18f3b2d43c7162fde050228cde8807880c3f9bb241181249d4c0a607fab80ccc1dc7e5b7b10
-
Filesize
160B
MD58df925aff7534ba844b1b8e8dd85f6a1
SHA190c3ecc7dd4323d9f1aab375384842e8cb96789f
SHA2560e361880abfcc5e8b32b3ef4bf5b9af5e0db192e3f81da2f035e63d5ddaaba29
SHA5127db8609dbcc561d1485ccd468c9e812ea879541efcf0160ec9cf9bd8c94f9808a8763022a752f7d7a0f8f526d99fb082db634aef7f2b214444c1bbfbfeb0ff7b
-
Filesize
192B
MD56f99e9e61359cf44b41dcd2cb10635cf
SHA1b6967e1c020f39597320dc27112ef91a1802f838
SHA256c723476d950a167592e676df47e686d1cb0527c21d741ae6cc75888049c82ae4
SHA512577e5330450ef5b56016228275212ec37043188b05baec4296ca7fe76b36130ba28abde65ea0f623572616c5ab4b38f6d72abe40f9ce80ea22ff532974d4b488
-
Filesize
192B
MD53ac3921d215a1af4cbc955433e21ae1e
SHA1155bd718014d9abd0b227512d1370ec10e7226ff
SHA256124ca23ebe3a92cbbaa6e6bacec1fd0b3dda5e494891c9f3dfe262ad5bfe8a4a
SHA51230af416c80435026d0416d4677925eaf3f94e390578c4ee20ceb7f3f621d1f35b32d9cb9be06f67186771e02e2491e0d4117c46b79e0128b40152179d1defad3
-
Filesize
48B
MD58b539b5f8592ffd1e42640957c318eaf
SHA178e411d0ac78515d6eaa653e22084bd7b961dcc5
SHA256fe7dbf0c40856b11323252af2050f77885b68acfc79ec7219a0c36626ace08a6
SHA5125a00970fa8e5447f9b431836cda855e25e8802ea5ecaefb5caba4c7c3ebeb41fa05e3ce79059179f2670f2ca5f6748d283d4362a8b3dca22fc6a58602d45ded4
-
Filesize
12KB
MD5c8d2807ba9dc45f455a018c2b01bdc45
SHA1610240398c6bbff74c33505a30981097ef1315fc
SHA25606a5247a84d3296d3861e30b31ec3e273416412fc7398780558e7d84bac11b82
SHA51263549631340c444298d63681fb01ab2d00e85ad763bdaf840bf690473194293e06834cd1aeae5f238ebc7e9960952ae1c52224a8929c5db3619b0238ede2d932
-
Filesize
10KB
MD53f4c403051ecf911174f5a81173ea87e
SHA193efa4cc1384871ace3efc9d6e83784722e093b0
SHA2562d7f0b9a8932178ca4ea5b0adc05f3832a08d29640d3e640896043ef607a5ef4
SHA512676b4c412ccdcfc0397e93e41ba3cb9e688970cd156fa27b0b38e09a3971a8ec4544f04d7c231b76c03b60f9158787697960e99562cc07e6c392216c99a04240
-
Filesize
323B
MD5288c2dfaef4744587ed9babe65464432
SHA128da9bc6b0411d2eb02f5e68187ccc5b5d040cae
SHA256ac74e39389d05bc95d40efc9cc7f4726281809d360ab117f92685d3779a85af9
SHA51248530d4bff93f816ddaa5aab1127d4ae6868a86bcf47eed6c1558e0ae9b6cb70a23fa6aca0dfd24b701cd2ab5075c8c0e100d40c94b08ea32123ec2866388b27
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
6KB
MD58ef7155decae521baa9551a30b889a20
SHA1a6b8cde6b0a6f46f3ea4f7ea4bbfa7b8c93f6105
SHA256009b6df8f126e1b538eb1436ba76a79c68dc5f3e5a08bf05a8aa991d362a57df
SHA5127ebabc93498b043c54ef6f5160d848667010415ce9b28ad3b799fa80b9b08c5140e46aa4008c439c15c279b301b37f3dbb6417114f5759e3aa6543b0dfb38ff9
-
Filesize
6KB
MD537adf24bd154862f84bcc94234ff4e5e
SHA144b27b902ab2936976c05d580b88bdd77b520c46
SHA2560fc6d1689d4f0bcc0e6b48673e7f6d9fbe95dc3a612072d0a3c3be3dbcb5e598
SHA5127c3f012646d358d0ce6f8b2828425270229109c53db96d21279fc2e6da8de773033f0c9db015fca064ab86d17960aba759187c0a9f145b7405e5c77833c7aa4f
-
Filesize
10KB
MD527089ec677e81eb50dcf51ead6220570
SHA1f44fd7758af973e01ee296e7f53729142127640b
SHA256c584757fe00881a17250bd6a63a6e4620bc98b98057ac6584c89a26de80ef71e
SHA5120936abe36f15bd3f974fd3b1957d7b2978d10a71f13de289b9eeeb190cffd70146374115e60681905df8ff6a2892fadd4ba31b898e20071099d784ee7d1cc940
-
Filesize
8KB
MD52e46d191fde29453b61c479ada3a3245
SHA1e7cd94fb2d5c328e65c8234929cfe8c04be60e27
SHA2568c4ef1cc4b8617053b25f411aeea4a10f7fff337658a53cfcf43fea52b3479ec
SHA5128c3ac84f69c099acb30eb4eaf582e67b628fcbf286dbaf98cd10e127ad7b058ff981a6baa18af4d0ccf9bb24e4a6f2f02654e0deb90a0e2e8a5c05ade85a48bf
-
Filesize
331KB
MD50129b824f09eec9e8561a37727c211df
SHA15471ae29ddaf628bd3a079850ad1ac23790aa599
SHA25637760c049e28afc42fd7246400eadd501ad64664d8d5aab9d2d1a6018d0c2b52
SHA51297b812fc082efdc80b19be0424eef3f52eb2c448f2ed910112ebde245abd738bc0c5f76dfb1a1b374c83b9ed8673440f2f1b0f3642055760c994dd4b4e2f235d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{677d5869-d5a8-4f01-b5fe-d8f1ed50f615}\0.1.filtertrie.intermediate.txt
Filesize16B
MD574417ef901be12be6e731a362df4e21f
SHA1eb2aa9c8ff7539e944e401fd1a8db138fd1336b5
SHA256433757d65336bebd32c5e78fb59b36ffe41f6b4501cb46c90e6c42069916a5b5
SHA512556419980bb89fb62b8e65c0f11676cf5a8c92a5d4cb3a28afaf908d558a75f9ac5c6c2502f2dac7a70ef01b128f59b7e7a46232a555e6a8dc60d1b79dfd8cfd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{677d5869-d5a8-4f01-b5fe-d8f1ed50f615}\0.2.filtertrie.intermediate.txt
Filesize16B
MD525ed0b6f5640288b1707023227e3ff7b
SHA1004abe889cf06a20bf91aea6fc0a9ec71f02b533
SHA25653c0860f27443d22bd889e3ae693fa3a8bc55a4af706b5e0254cce27d7c57d19
SHA5127a3fd54bac3227e3bd46a126362cfafb7ecd8d0b38c19d65e82c2924a12cfabfae0ceface920e14b493d7a940e213907cfd3d8feaa87f6139ed7a24968d59154
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133842783387690870.txt
Filesize59KB
MD5a9914dd2e06221d45e5fecb219182dc7
SHA1f199b830f7e1d1e6c541da0564d1b081fcc77e6e
SHA2565d994481fef568f1802a33bc5ac810a462f3b65283fba6dc40712b37369af511
SHA51293584af4dfb4c8dfd99e5562f3264e5bc0a1537979dbdc16c86ed618d13dfe0524a51f17ca611b224798f24cfd9bba00ce77b6cfa05f3e953c1ef176480aedc9
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133842791154042069.txt
Filesize63KB
MD5df92f33998cb6e5dfb21c4872a1236cd
SHA10fd0f1c1d8ea154ee611e796622380527e8c7645
SHA256e7eaba0a9faac83504156675d59226b8e8ffbe9227942b9a32ef612bb278816b
SHA512311510bf26cb9633da57d9f8653a1522de2146c742478069ac0009643ff922eeb811cb96f0cb7fac246f870d45a2b2c32f05e8c9c0fcd7049c267059f780db09
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133842794058987458.txt
Filesize74KB
MD55379dfbfcf235f469224dd02000843cc
SHA151cb5a9aa285e82062737f0e96cc6a02e8154673
SHA256c5dece0541351630461a8b49ca9e8d456dc6c9b3c9234d758a577f29d75ccfb9
SHA51204963edd6b76b30713db3214a9818cbb56df5320a27dd291c6464ee724e3a0414d6d9d9b129774b57854ff4c1b618e8a3688633338705e36fc5d8006ad81e0f6
-
Filesize
36B
MD58708699d2c73bed30a0a08d80f96d6d7
SHA1684cb9d317146553e8c5269c8afb1539565f4f78
SHA256a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f
SHA51238ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264
-
Filesize
656KB
MD5a1a9badaec3387827a84f862dc29103f
SHA15eb1fa49a707fbb9b550157b96d0aae0f89d6c30
SHA2564c44d2fe26943baa9fd2c03949d46a6f8f3348d41984c9a2cc8b0336da18329c
SHA51273e6afac9131f769c53ceb60bd3b27c84ff668017c8c653ac9246f15fe50ae208af919224689a04b0af020b4d0900f882000067f99429b5bcf34a64d6003dbcf
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
21KB
MD592ec4dd8c0ddd8c4305ae1684ab65fb0
SHA1d850013d582a62e502942f0dd282cc0c29c4310e
SHA2565520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934
SHA512581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651
-
Filesize
14KB
MD5046074d285897c008499f7f3ad5be114
SHA1159040d616a056ee3498ec86debab58ef5036a55
SHA256254c5ccbce59ad882f7f51d0bf760cabde8c88c5af84e13cc8ad77ba0361055c
SHA512ab7436fda44e340dd5909ddec809c6b569a90d888529ef9320375e1aae7af85afcab8c1c1618551d3fe8d6ae727f7dca97aa8781b5555da759d501d2ccd749e1
-
Filesize
10KB
MD50ff5120f1afd0f295c2baa0f7192d3f8
SHA1bde842d5d11005dcb4ff1d4ea97da31865477697
SHA2564ca5bf1beb4b802914c4d3e2f37861f6ba5ecf969cfeadf5855edf58f647a721
SHA512e049ffd7aace8d136eee007ee4f8dbc2ae8f3dce79d1c633d9654392240f8215787df8a6d08085257db51f28ff2a8023a13333dda3ea7f9bdc8b9c57b605f0a0
-
Filesize
709B
MD5b3b875322353be6e0f4bbe165402c42c
SHA17f5f2c4026e995a1784d07358372709ce9ad3af0
SHA256f1b4e8812541be54c4c8b95b37adbde734e7195c91709f2c1ca0796be79c7301
SHA5122f5f58709f7315d275e794153e0e9ceb867c2bf7764337bac8e47af6bc9d5561ab3bfd393d0beb544424b41ca74305791c81fbed68a3bfaf122ec79186127186
-
Filesize
558B
MD5fdf0edef9aad75f44a30ecfbb26b3046
SHA1fc7deae97368177f32e1104f7b5c69e454088f62
SHA256f52d6997fcc569ccdb5e8fa21736fb0bff6178d96dde2190c7b226fb44372439
SHA512205071e276c16b69b041ca449b056fd1f4cad0531208a062d36b305274d2c8f7b7efac66f59abb93b45d189f2cf04a344bd2395ce9f9b8674a603c5cb8982789
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
35B
MD528d6814f309ea289f847c69cf91194c6
SHA10f4e929dd5bb2564f7ab9c76338e04e292a42ace
SHA2568337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
SHA5121d68b92e8d822fe82dc7563edd7b37f3418a02a89f1a9f0454cca664c2fc2565235e0d85540ff9be0b20175be3f5b7b4eae1175067465d5cca13486aab4c582c
-
Filesize
86KB
MD5699f5323bd64599c8be8da57de81c276
SHA1390c5c82758ddb456cd54c7db6a5f741b6229e01
SHA25637b00cc7157bd5524a0436768c373baaa44bfafca6620259c4c38382b5345531
SHA512b71d4c588d3a1ffaed815623ec593bf806813f49cf05f16b9d26d8bf46a7d01bc57b4c01f9c63ce76725c34410ed164ee7c1f39caa16ec8bbc5453df136e12c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize8KB
MD50931d17b912e2a464a74c3176204a364
SHA1e7f3d0d644f39dee66e7448c0b04ddd85dd8ae6a
SHA256dc53897641027823607aaf5f8dcd6c0e17c8c5046219e16259ee6f92c939a512
SHA5129957ef48e13e2d1b6b615a558070c26e2bdd88c12909cf775eabcf6b165e286280474d43d4662bed9996ea94a12579203ba49769a39b63766fef5e5abf63811f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize8KB
MD5bbfaab045d5fb2a9f3f4175e4a41d5ce
SHA10f2ab1ad18438e51e9ac34ff27678d4428aa4a0e
SHA25639216124d01197e825b9f722a7a270169fbee4be8e322181e447ec53b3b57d61
SHA512f5de6d4ac42ffb119abde7aff987450a2d033733a1dc8b1af346da4d79cb8e09c7571cbcac421da556adbd556dd4f4a83e9a43cf1758a799c7accbad6403624f
-
Filesize
51KB
MD5bd74a3c50fd08981e89d96859e176d68
SHA10a98b96aefe60b96722d587b7c3aabcd15927618
SHA256ab305218ee0e95fa553885fa52f3a25dcc13b4deade8b7993ccb9f230a272837
SHA5120704243904abc3691177e34606fe2741945f69cf7ecb898655d98e81b145bf707d20cfa0af01fb3aa1cd170e2f3ce8f625b1612e0fcf5eba01f770617ffc9f1e
-
Filesize
53KB
MD5585c9143eb0844aeec85c3af21a7d672
SHA1ec5fc010988f146f5e3f7edf3bfad8c63bd9f2e3
SHA2566d9b4ae391099f4c991d70ae0f68a2aefa58845c172a12bff7315cae6ce0b7f5
SHA5121852d956cfa433c4a73717be160e158039c68d3d2852240772ccbfe604b7ce624c4dbbe4201fef745134d7dddb810f8147116be73d01581357ef7f5fa690e6d7
-
Filesize
72KB
MD505398e895a1d2751ac56f2d39ff194b7
SHA18233e3a8deec50f0b71e56779010039ab0a279ea
SHA2566ab6557dab9389cc5538fddb397176622135aa37c883c82f026c11fa18d14af3
SHA5122144a4359eaf047b18cea41c476d8c61afe171e2df56fc1227177e68a11182b716a5364222c90bda9ee98476fdeb5007dcaa1d5f000beb527e37b6491f2a09c7
-
Filesize
355KB
MD58abe9429bf02617e7e83a4611eb2a94f
SHA184e40c76f63dcf2d1504fcc3b84ef4463724053e
SHA2566cb8e377d1cc73abac3c22e83793fbe879eb1408d29006017c7a9032536522b0
SHA5121a74b7ed28bc821461e03b9c1f2bedc26ef2667191949b969fa9c5f5de4f1589717dec7666009ae2b72c93ada98a5274442328ff4e2533d570c170c6b0c93dfc
-
Filesize
52B
MD5cf04b007122f123925dc4c3bb64324d3
SHA1e36f62bf23f8cb360a5a046f116a4947c6ba7d0e
SHA256a0484d9344117177a742fd240f7e047f9c9178587fd578c2816eb28a62d3352f
SHA51272583e61023507b37ac75671a6009905d3057dbe4fec164f868db355b1a0bee221ec098849fdb2151353fc9310225c127ce29ba3d7757fdcbe246ac8c66ec626
-
Filesize
48B
MD5fe6881782b4c4f64c1368175e01986f9
SHA15a4392701a5261a8c2e6dfd4c9bddbb620a09e05
SHA256076caa0e64ac3d318467fbc70ba39cabf5345bf70fd9872e9ac0e5d346fa0107
SHA5124bd855b6369d1fdc61354e59c04211520b6a27bd18bbe0c050ad81947db404d6fb5fb02049a6a779e12d3ed2fe11ef259556894c94475943b01cdfdbf6a04238
-
Filesize
224KB
MD5a315d1980e842faf6967f41d25c910e8
SHA14ae4358fda37c86bb5ba500ed3368a3c33b3616e
SHA2564bb51e3be7ce015f672f4142b0b89952350e7961ac3c639ae2a059e6d0235268
SHA5126cc1fd4fec68951f8a5ddee4406dda75e8354cd537295ad2e7c9c22f1df559b77644e3f2636c29133a4b430464877c3fd0178c79bbc47f53dc84eb297c4fa737
-
Filesize
284KB
MD513315a9408112db05b7570b2d4f637f7
SHA178fa6aa5433a6d445e33ea50c5a7118ecbe2d93e
SHA256279ec2373b7e3c32e23a402629b5875f2f14a6ce05ef2ba4b8935cda3f7a3c7f
SHA512997a1e837478c624686588cac180715e9858ae905a50d4cd1b450586958e157a5fa320db8fdf72793a485216031a9b8363d4f06338521ed08b35d9f9a7f5ade2
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.MSIL.Agent.xk-73a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c.exe
Filesize623KB
MD53a73d29d74e0930a508f368dc87ca333
SHA1aee02b10a74c2fdd257d161fd8e03b37878a803f
SHA25673a7ab4dd80364a090bc41971d6ebe95a4451f9bbd8340dc07af4dc86071999c
SHA512952b6d0591b8c610717d2e7a5bd5aad6078c2ffe5a0fed38fde2a72ea80e27ed76734d412c67de48fd3e0672be0ca54e81bc0bed1ce8364bbb3727c0487b4e7f
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.NSIS.MyxaH.qjc-7c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc.exe
Filesize143KB
MD540b29eacfb41d6d51731c301b0ed5042
SHA10f27dc0c8ee9ef1e328fe6b79a82a1606b190f5c
SHA2567c728d19d0a3e35591ef99a099da06654cf6c8d941e3523695f9b8a7f9e53cbc
SHA512eb1da9033157f3ecb1653b37feafc9e049b9fc2aa96a4dc06944f8f7cbb342bc44e0b9097f49b36b76f9b0fa99d46e930df63981efc250ec326467c0a1f6bc78
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.NSIS.Xamyh.bqk-ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f.exe
Filesize489KB
MD5246e102214620394e70f5f0cdc02f6c2
SHA1686b8ab2968f63fe33c7749e60da06b093db0958
SHA256ab48c5c49cda1c553f9da8b7b8007149af2974f454078c720cabe0f76cbfde9f
SHA512c082e106d5493a6b7b5454608fb0545b85ce404f430884b19d6926e09a12f0dd2334d4ee1f73f539b09b042497bdbc01d64a736ad1229b43676d2ce37f27a8d9
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Bitman.jki-c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1.exe
Filesize384KB
MD5b3b03da3bade01e81eb6f0e2afe13310
SHA1c8c47746e535d3764cc04ecf4e2842bf966ccb8d
SHA256c2699493661c6f6ba2a42270152f9b790135905a8b5eadc0ca6003312c3eebd1
SHA512d56ebe2691239ce51fe8df6f719f10517f5dd6a42a7c2edfcbef22ca237983758a927c56d4f9d500f5e6436eee556b5069bb68613bead04fc937e325072ccee3
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Bitman.kba-521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a.exe
Filesize372KB
MD5f5af0866822aa22c69a43e3bff6a9ac6
SHA1f2a96f20bcb725c3c159759cbc7a3200268ea889
SHA256521294a88093ea2b7a2b89ec3005b6398f20780874d410663b63429e58b1555a
SHA5122f333f560a51355c553a0c23edc4d75897b708a8a9c0d86086745d4bdac749a661cb9e6d2118cbf563abed2385b50a626add00a35bf34fd5f39a36893d17f5b3
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.ikct-b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf.exe
Filesize332KB
MD5f268cbaea79e20d3a7c3ea53bee6e549
SHA1cdf5a82e703bd50e4727ae597b26028d8e4ebad6
SHA256b18a72c5a8e9988673bc4187c9dc4935e9c7d1a30975535673b28d5c3afcffaf
SHA51235c9167bd29c1ed4cb312ebc31156da6c430ad362a9b1491801dbb4394239a85ebbedf8647030d17ad411e5aec578482fcfbef0fdda05582cbbe9ff6b731a74d
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.jejv-643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54.exe
Filesize317KB
MD5c891182b7c4046b5e6260e585a9810df
SHA1ce528b9d0993e822274d520d7590529bdbc4cfa3
SHA256643d145aaee4f2917f7e01312b4a013792796a02544760d471842490a8ff7b54
SHA5125a242a89f144478f81c3a96c29967a8d895d9c0c58e80b47c96db762f72bfc2069866376f562c74c8e3748e63e1deb3881f6c01823d14317953a9312f2b70222
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.jmak-c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2.exe
Filesize1.3MB
MD5d41cfb2cd865d1deab582e03e8737ec6
SHA1047e4da17c9d045b5ac62c4575952f4e8f31e13b
SHA256c726390f3511ed600feaa63d649fd7ed3e48364449f94c34fe0e24d5d9f431f2
SHA51260b70b56884a9f44f1894af9994949f60862156aa42902d1e6dd01a0682e77f543ef049ad9e35106eff5505d24f1e1e20fad094cba4506853f05e5ae46d34d25
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.jmhe-fa7d4385076a48495bb1ddbb2691964bb69bcec77515fb7b81c686dba11179a8.exe
Filesize1.1MB
MD5aa69ebbaa951d1f561ff5d47f2133dff
SHA1d0746cabcc48fb5949ec3bfb9e88cc89a83544bc
SHA256fa7d4385076a48495bb1ddbb2691964bb69bcec77515fb7b81c686dba11179a8
SHA5126901aee46bd81bd85d81c406a6715671bbd6d4440a0825661c431fb138b61059df5e860e6984166c370b224e51d7b4a71d879cf4627e89d7c9130b0e8d0b8891
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Blocker.meia-d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329.exe
Filesize63KB
MD53dd6a7d7d63bcc526de3caf654a46966
SHA1bf11c439acaff7e1b974c05ee940d06497405461
SHA256d5987119e3d7552d561e303719b23418aade45e5d6eab7a541e29214a93a4329
SHA5121afa19c97a23813b9ecdbffa31c6a5e107a8c4348c038cbe4200c9eaa43903300668e9baf777c1fb5816f15d3d029b025cf97041999ddbae6ee043457471aa2e
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Crusis.bh-d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0.exe
Filesize471KB
MD52db04a394cf5b117dac8833926cfb930
SHA1d5670fecd46e793d42de7ade54f3239cd86cca73
SHA256d55053a93609d0a23ef29993096a49b1e267227846e1539c07652dc11fc090a0
SHA512e670554679d529352248665bb19d45570b8b723cadd9e1506aaf195f55c8d19bcf3f05b5676960829063aafe8701a0e658b731b8733bd23039868327b2e56172
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Crusis.p-3eb242f7b6497f8be2bfbee704188717562fb80e65b792285a0e797b8ca46cac.exe
Filesize838KB
MD517a7dd1b0b2d1194d8bc56183c8e385e
SHA178d442e24372339bd7f9d52641b877065ee8fe3b
SHA2563eb242f7b6497f8be2bfbee704188717562fb80e65b792285a0e797b8ca46cac
SHA51207f85845a7c2cdc36e039fc360733b6fefd3969790661f25dee4bf847b910e43f853d4a2098f6c27e87fbd30bfa2b4fd67f5b1b772eebdfc1688ca03c25be6d7
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Cryakl.ana-9c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052.exe
Filesize838KB
MD5a6ab8f5e98144eabe095418500d454f2
SHA1bba9950762c2103de41e8de854475a3989a260e6
SHA2569c7bc2e2f8dca509383de49603ec6ceb9905bb4bd3296aeafea427cae524e052
SHA51253e219a1a27a4db1252b4f8ccda6a6b6b38ba0b1b677a8e5c841896df2ec55b7048a69dd2b48c9372916fa25c1dd240613cf5abcef548edd01dcaa534e6ad424
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Cryptor.el-a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7.exe
Filesize278KB
MD59597fc80f793bbeceed69be9b1344fdb
SHA1b05fe3053fe4e98055a060793c0fd6fd7f7b5f59
SHA256a32468ee49dad05def0fabc79b44b053490d8ff663ee95007d61bb47a7024bc7
SHA512aca1166ea462756a2ea31936a2c8f8f3717d39f9cecb64164b001c846a35b491fba536d516cf0eca97e8dadd8d7645392d24624eae072ceaec31c0d7421de75b
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Foreign.ngeg-4686da1dcfbbc0ac3330d77f56d743431a5e8cc40983f99dc5dec1de6fbf2877.exe
Filesize495KB
MD5bc7fe76843cb2f329d652d9a0a09e02a
SHA1f12ded4a3f6723efe90d38128be8883b54f7bbb4
SHA2564686da1dcfbbc0ac3330d77f56d743431a5e8cc40983f99dc5dec1de6fbf2877
SHA5128e929bda09b545c37020941bb994a3d50c56961d4e0adb9b1aa7837e77086d7e1f40ef1bed46556f9377b56b12f8cfd710c17ecac14333e37dffe9f1f29c4ff2
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Locky.bim-e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2.exe
Filesize521KB
MD556f06ee3af5312fbf2e0ffa70f83bde9
SHA13af7d97ef80b7161742eb75c94b3de415bcc035e
SHA256e9ba53ed9e698682792e67fd7fb3c20645553f347a90d0b2be89d5e0ab610bd2
SHA5120632f94aaf94138c3bb9e95d814628d6781a5077e88d1cc7696f41c7ec77d07cba67edade75e1142c411d660965035a72deee2511da5ec0f4b7fb7b694d418f8
-
C:\Users\Admin\Desktop\00267\Trojan-Ransom.Win32.Purga.p-66540d2e0ffd750f23aadf78becb7b4d4572068de3ad95037075f0b08744e113.exe
Filesize555KB
MD5bdac5765a652a36144e742ab56b4f2f1
SHA10e35a0ea0bcadad72903a02a4c297cac1d0f2f68
SHA25666540d2e0ffd750f23aadf78becb7b4d4572068de3ad95037075f0b08744e113
SHA512eab65a41e3e55410e3fb84d17a9e06fe4589967b930cc0ca78493867aecad2c16270c3685e19cf3bacb8a21756cbaecd3ce0ac0c22692da4453c2e3c4f025068
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3
-
Filesize
85B
MD54bd3bb3877f68e6688c6eb982f7ad9c1
SHA186863f92cfaefc0cfe28fcb0e5606915125fb76c
SHA256f98b4f0e5be42e2b92789869d62767c476a1a98b92fa15d723d2cffb0d48e7d4
SHA512181deb2d6f66ae7d9c3ab8d606032ca681e8d0b7ee286dba95d537b1781d97928d9d99ab72e77a1a90de77dc223c73738d5423bf8ac853d82d989f0eb49fd12b
-
C:\Users\Default\Music\[email protected] 1.3.1.0.id-VLBMJFAUQLFBUQMHCXTNIEXTPKGAWRMHDYTR-2@24@2025 11@01@35 PM8577786@@@@@BB31-2DDF.randomname-TVXCYSLAUOFUMAQFXMCTBNIBQJAPGZ.XYQ.dxv
Filesize22KB
MD54a492bada350a5651debbd1e64bb23d0
SHA1834bd5537929611b86f68d6ac91b7ca9546be226
SHA256695699f1a5a078bb41618cfc14e0299e1debc575d99d3360e8d347c372163813
SHA5123e9a92ae9f56dc2e1f35ef23958ce586a7055881b66aa82b3fdd03f99e478d25998c456508f269575fc67598d7c9fd3890ecf7d4b4fc833892df2db8c9295209
-
C:\Users\Public\Music\[email protected] 1.3.1.0.id-VLBMJFAUQLFBUQMHCXTNIEXTPKGAWRMHDYTR-2@24@2025 11@01@35 PM8577786@@@@@BB31-2DDF.randomname-NQVATDIMTXZDJMQVCHMRWBGIOSXAGK.ZFH.lji
Filesize22KB
MD5905da732dec54eb38e2163e450171848
SHA171bbbed97d50e7141378026fa25c59f6734f53a3
SHA256330794ae7bf8a91b043b061aa738290433e0bd8939566987fd53ace076e96351
SHA5129e8595c99708d190a67bb6afba65316ec59b3f764e935140d6f558da16a879832d88d26ce7b670bfff3ce9cdbdb964a95277cce1f0d839ee1569b3a582c22b8b