Analysis
-
max time kernel
254s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.7z
Resource
win10v2004-20250314-en
General
-
Target
Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.7z
-
Size
894KB
-
MD5
d41f6613256eb0ad7422d080e25b1295
-
SHA1
1b0467ff55f311fbb2374d60167954c8afa1bf6e
-
SHA256
773a84c3fcd0056ba603a8289affadb52b3ec1162fe161d4874aa9bc30b4e8d8
-
SHA512
cc94ead6e6ae0b999082decd7ed656c25647e16b2ce09b6f604cab565aaa7ef2a12cac5b4d60e6553236fb5b53f51e8098a4282df429e0c44b1b6fc19f40a228
-
SSDEEP
12288:/ve9LHimubryf14MQQ95OJHu9DgCgAaDKIMgaeI1jgeheAIm0w39D8wT0EJ3d7a:ogumMQQ9IF3CUKeehlv0Ih8G0EJ1a
Malware Config
Extracted
C:\Program Files\Common Files\DESIGNER\etrU_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 5860 wevtutil.exe 2024 wevtutil.exe 5140 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2652 bcdedit.exe 5468 bcdedit.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation firefox.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation tor-browser-windows-x86_64-portable-14.0.7.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation firefox.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation firefox.exe -
Executes dropped EXE 17 IoCs
pid Process 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 3956 tor-browser-windows-x86_64-portable-14.0.7.exe 5948 firefox.exe 1632 firefox.exe 6000 firefox.exe 4308 firefox.exe 5324 tor.exe 5216 firefox.exe 4424 firefox.exe 5504 firefox.exe 2072 firefox.exe 6512 firefox.exe 6544 firefox.exe 6576 firefox.exe 6264 firefox.exe 648 firefox.exe 6032 firefox.exe -
Loads dropped DLL 64 IoCs
pid Process 3956 tor-browser-windows-x86_64-portable-14.0.7.exe 3956 tor-browser-windows-x86_64-portable-14.0.7.exe 3956 tor-browser-windows-x86_64-portable-14.0.7.exe 5948 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 6000 firefox.exe 6000 firefox.exe 6000 firefox.exe 6000 firefox.exe 6000 firefox.exe 4308 firefox.exe 4308 firefox.exe 4308 firefox.exe 4308 firefox.exe 4308 firefox.exe 5216 firefox.exe 5216 firefox.exe 5216 firefox.exe 5216 firefox.exe 5216 firefox.exe 4424 firefox.exe 4424 firefox.exe 4424 firefox.exe 4424 firefox.exe 4424 firefox.exe 5504 firefox.exe 5504 firefox.exe 5504 firefox.exe 5504 firefox.exe 5504 firefox.exe 5216 firefox.exe 5216 firefox.exe 5504 firefox.exe 5504 firefox.exe 2072 firefox.exe 2072 firefox.exe 2072 firefox.exe 2072 firefox.exe 2072 firefox.exe 4424 firefox.exe 4424 firefox.exe 2072 firefox.exe 2072 firefox.exe 6512 firefox.exe 6512 firefox.exe 6512 firefox.exe 6512 firefox.exe 6512 firefox.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA firefox.exe -
pid Process 1976 powershell.exe 3576 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\da\msipc.dll.mui.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_t44blL2qg180.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\BadgeLogo.scale-125_contrast-white.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\SmallTile.scale-200_contrast-black.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\flavormap.properties.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_rDwDJ70oW5A0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\relaxngom.md.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_-m2DhlvGQvA0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSmallTile.scale-200.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\etrU_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-ma\etrU_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\mshwLatin.dll.mui Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\hijrah-config-umalqura.properties.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_BqWPB0skNsE0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ul-phn.xrm-ms.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_fPHsAW2h2EQ0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_KMS_Client-ul-oob.xrm-ms.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_hOS5K5XAaMc0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_CatEye.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-48_altform-lightunplated.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-72.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-200.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44LogoExtensions.targetsize-256.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketchAppService\ReadMe.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.513.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ko-kr\ui-strings.js.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_JaZjCBGogQY0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ui-strings.js.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_k8-w9utMXOo0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado60.tlb Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\root\etrU_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\TellMeOneNote.nrr Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-96_altform-lightunplated.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\WideTile.scale-100.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\download.svg.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_Iv_M5tfbLj00.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\192.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteSmallTile.scale-125.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-30_altform-unplated_contrast-black.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-gb\etrU_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\BLENDS.ELM.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_kjPQrJiSsGI0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\Timer10Sec.targetsize-32.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-il\etrU_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\TipRes.dll.mui Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ro-ro\etrU_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019DemoR_BypassTrial180-ppd.xrm-ms.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_wWiNXqYD45w0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-ul-oob.xrm-ms.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_hNmigVkC3A80.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_altform-unplated_contrast-black.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\Doughboy.scale-200.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions.png.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_6F36u2KdhGI0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\etrU_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Trial-ppd.xrm-ms.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_fMUAwggN-K80.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ul-oob.xrm-ms.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_XKc9KA7THEg0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-24_altform-unplated.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\Klondike.Large.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsSmallTile.contrast-white_scale-200.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailSmallTile.scale-150.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelFluent.White@3x.png.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_oDZpOZj2Dwg0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\PhotoViewer.dll.mui Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Notification_AppLogo_PowerStatus.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\MakeAccessible.api.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_MXjrfV4s8Eo0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\wmpnssci.dll.mui Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymsb.ttf.d4D2tF2OZm-3fum36tckV3UUU0LGli8qV7nPtizF4XP_xIBD_UxhfEw0.mhkwl Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalStoreLogo.scale-125_contrast-white.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\MedTile.scale-125.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlbumMediumTile.scale-100.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarLargeTile.scale-150.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\WideTile.scale-200_contrast-black.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\Movie-TVStoreLogo.scale-100_contrast-white.png Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ar-SA\View3d\3DViewerProductDescription-universal.xml Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1252 sc.exe 4016 sc.exe 2984 sc.exe 2392 sc.exe 4128 sc.exe 1436 sc.exe 3512 sc.exe 1628 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7108 cmd.exe 3628 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3436 vssadmin.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133866130908174798" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tor-browser-windows-x86_64-portable-14.0.7.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 7060 notepad.exe 3204 NOTEPAD.EXE -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3628 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 powershell.exe 1976 powershell.exe 1976 powershell.exe 3576 powershell.exe 3576 powershell.exe 3576 powershell.exe 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2208 7zFM.exe 2208 taskmgr.exe 3956 tor-browser-windows-x86_64-portable-14.0.7.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe 3184 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2208 7zFM.exe Token: 35 2208 7zFM.exe Token: SeSecurityPrivilege 2208 7zFM.exe Token: SeSecurityPrivilege 5140 wevtutil.exe Token: SeBackupPrivilege 5140 wevtutil.exe Token: SeSecurityPrivilege 5860 wevtutil.exe Token: SeBackupPrivilege 5860 wevtutil.exe Token: SeSecurityPrivilege 2024 wevtutil.exe Token: SeBackupPrivilege 2024 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2192 wmic.exe Token: SeSecurityPrivilege 2192 wmic.exe Token: SeTakeOwnershipPrivilege 2192 wmic.exe Token: SeLoadDriverPrivilege 2192 wmic.exe Token: SeSystemProfilePrivilege 2192 wmic.exe Token: SeSystemtimePrivilege 2192 wmic.exe Token: SeProfSingleProcessPrivilege 2192 wmic.exe Token: SeIncBasePriorityPrivilege 2192 wmic.exe Token: SeCreatePagefilePrivilege 2192 wmic.exe Token: SeBackupPrivilege 2192 wmic.exe Token: SeRestorePrivilege 2192 wmic.exe Token: SeShutdownPrivilege 2192 wmic.exe Token: SeDebugPrivilege 2192 wmic.exe Token: SeSystemEnvironmentPrivilege 2192 wmic.exe Token: SeRemoteShutdownPrivilege 2192 wmic.exe Token: SeUndockPrivilege 2192 wmic.exe Token: SeManageVolumePrivilege 2192 wmic.exe Token: 33 2192 wmic.exe Token: 34 2192 wmic.exe Token: 35 2192 wmic.exe Token: 36 2192 wmic.exe Token: SeIncreaseQuotaPrivilege 2200 wmic.exe Token: SeSecurityPrivilege 2200 wmic.exe Token: SeTakeOwnershipPrivilege 2200 wmic.exe Token: SeLoadDriverPrivilege 2200 wmic.exe Token: SeSystemProfilePrivilege 2200 wmic.exe Token: SeSystemtimePrivilege 2200 wmic.exe Token: SeProfSingleProcessPrivilege 2200 wmic.exe Token: SeIncBasePriorityPrivilege 2200 wmic.exe Token: SeCreatePagefilePrivilege 2200 wmic.exe Token: SeBackupPrivilege 2200 wmic.exe Token: SeRestorePrivilege 2200 wmic.exe Token: SeShutdownPrivilege 2200 wmic.exe Token: SeDebugPrivilege 2200 wmic.exe Token: SeSystemEnvironmentPrivilege 2200 wmic.exe Token: SeRemoteShutdownPrivilege 2200 wmic.exe Token: SeUndockPrivilege 2200 wmic.exe Token: SeManageVolumePrivilege 2200 wmic.exe Token: 33 2200 wmic.exe Token: 34 2200 wmic.exe Token: 35 2200 wmic.exe Token: 36 2200 wmic.exe Token: SeIncreaseQuotaPrivilege 2200 wmic.exe Token: SeSecurityPrivilege 2200 wmic.exe Token: SeTakeOwnershipPrivilege 2200 wmic.exe Token: SeLoadDriverPrivilege 2200 wmic.exe Token: SeSystemProfilePrivilege 2200 wmic.exe Token: SeSystemtimePrivilege 2200 wmic.exe Token: SeProfSingleProcessPrivilege 2200 wmic.exe Token: SeIncBasePriorityPrivilege 2200 wmic.exe Token: SeCreatePagefilePrivilege 2200 wmic.exe Token: SeBackupPrivilege 2200 wmic.exe Token: SeRestorePrivilege 2200 wmic.exe Token: SeShutdownPrivilege 2200 wmic.exe Token: SeDebugPrivilege 2200 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2208 7zFM.exe 2208 7zFM.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3796 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 98 PID 4704 wrote to memory of 3796 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 98 PID 3796 wrote to memory of 4816 3796 net.exe 100 PID 3796 wrote to memory of 4816 3796 net.exe 100 PID 4704 wrote to memory of 3900 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 101 PID 4704 wrote to memory of 3900 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 101 PID 3900 wrote to memory of 2260 3900 net.exe 103 PID 3900 wrote to memory of 2260 3900 net.exe 103 PID 4704 wrote to memory of 5564 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 104 PID 4704 wrote to memory of 5564 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 104 PID 5564 wrote to memory of 3580 5564 net.exe 106 PID 5564 wrote to memory of 3580 5564 net.exe 106 PID 4704 wrote to memory of 2040 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 107 PID 4704 wrote to memory of 2040 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 107 PID 2040 wrote to memory of 3960 2040 net.exe 109 PID 2040 wrote to memory of 3960 2040 net.exe 109 PID 4704 wrote to memory of 1356 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 110 PID 4704 wrote to memory of 1356 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 110 PID 1356 wrote to memory of 5140 1356 net.exe 112 PID 1356 wrote to memory of 5140 1356 net.exe 112 PID 4704 wrote to memory of 1968 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 113 PID 4704 wrote to memory of 1968 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 113 PID 1968 wrote to memory of 5860 1968 net.exe 115 PID 1968 wrote to memory of 5860 1968 net.exe 115 PID 4704 wrote to memory of 4208 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 116 PID 4704 wrote to memory of 4208 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 116 PID 4208 wrote to memory of 3376 4208 net.exe 118 PID 4208 wrote to memory of 3376 4208 net.exe 118 PID 4704 wrote to memory of 2928 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 119 PID 4704 wrote to memory of 2928 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 119 PID 2928 wrote to memory of 5356 2928 net.exe 121 PID 2928 wrote to memory of 5356 2928 net.exe 121 PID 4704 wrote to memory of 2984 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 122 PID 4704 wrote to memory of 2984 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 122 PID 4704 wrote to memory of 2392 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 124 PID 4704 wrote to memory of 2392 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 124 PID 4704 wrote to memory of 4128 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 126 PID 4704 wrote to memory of 4128 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 126 PID 4704 wrote to memory of 1436 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 128 PID 4704 wrote to memory of 1436 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 128 PID 4704 wrote to memory of 3512 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 130 PID 4704 wrote to memory of 3512 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 130 PID 4704 wrote to memory of 1628 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 132 PID 4704 wrote to memory of 1628 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 132 PID 4704 wrote to memory of 1252 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 134 PID 4704 wrote to memory of 1252 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 134 PID 4704 wrote to memory of 4016 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 136 PID 4704 wrote to memory of 4016 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 136 PID 4704 wrote to memory of 5756 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 138 PID 4704 wrote to memory of 5756 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 138 PID 4704 wrote to memory of 2996 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 140 PID 4704 wrote to memory of 2996 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 140 PID 4704 wrote to memory of 2140 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 142 PID 4704 wrote to memory of 2140 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 142 PID 4704 wrote to memory of 4756 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 144 PID 4704 wrote to memory of 4756 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 144 PID 4704 wrote to memory of 6016 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 146 PID 4704 wrote to memory of 6016 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 146 PID 4704 wrote to memory of 2448 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 148 PID 4704 wrote to memory of 2448 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 148 PID 4704 wrote to memory of 6060 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 150 PID 4704 wrote to memory of 6060 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 150 PID 4704 wrote to memory of 5884 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 152 PID 4704 wrote to memory of 5884 4704 Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe 152 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:3160
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:4816
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2260
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5564 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:3580
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3960
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:5140
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5860
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:3376
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_287d7" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_287d7" /y3⤵PID:5356
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2984
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2392
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:4128
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
PID:1436
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1628
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1252
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_287d7" start= disabled2⤵
- Launches sc.exe
PID:4016
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:5756
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:2996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:2140
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:4756
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:6016
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2448
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:6060
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:5884
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:6080
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:6056
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:5248
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:4236
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:3996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:6044
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2376
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2588
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:3768
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:5820
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1668
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2440
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:604
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:5280
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:3808
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:4744
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:644
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:832
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:6076
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:4552
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:4636
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:4932
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:4648
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:3904
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:5996
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3436
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5140
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:2652
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:5468
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1064
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:4880
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe C:\etrU_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:7060
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7108 -
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3628
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2208
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" display.dll,ShowAdapterSettings 01⤵PID:3084
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5272
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\etrU_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3204
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2804
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3184 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x124,0x128,0x12c,0xf4,0x130,0x7ffb5d5fdcf8,0x7ffb5d5fdd04,0x7ffb5d5fdd102⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2008,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2416,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3556,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:5364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4452 /prefetch:22⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3976,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4996,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5056,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5536,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=6084,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3640,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5976,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=6012,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=240,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5520,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3560 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4780,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6068,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6316 /prefetch:82⤵PID:1728
-
-
C:\Users\Admin\Downloads\tor-browser-windows-x86_64-portable-14.0.7.exe"C:\Users\Admin\Downloads\tor-browser-windows-x86_64-portable-14.0.7.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3956 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5948 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2548 -parentBuildID 20250303093702 -prefsHandle 2516 -prefMapHandle 2508 -prefsLen 21011 -prefMapSize 252221 -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {b50040a3-caa3-4aaa-8be7-f88b7ee3fe86} 1632 gpu5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6000
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe" -f "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc" DataDirectory "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor" ClientOnionAuthDir "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\onion-auth" --defaults-torrc "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc-defaults" GeoIPFile "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip" GeoIPv6File "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip6" +__ControlPort 127.0.0.1:9151 HashedControlPassword 16:ac8710ac2008b98b603485fbf944d580a699eead9e227209923ec159b1 +__SocksPort "127.0.0.1:9150 ExtendedErrors IPv6Traffic PreferIPv6 KeepAliveIsolateSOCKSAuth" __OwningControllerProcess 1632 DisableNetwork 15⤵
- Executes dropped EXE
PID:5324
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2000 -childID 1 -isForBrowser -prefsHandle 2280 -prefMapHandle 2276 -prefsLen 21821 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {ab249aa5-3d0f-4e02-b79a-03d6db32a416} 1632 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4308
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3132 -childID 2 -isForBrowser -prefsHandle 3124 -prefMapHandle 3088 -prefsLen 22591 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {a53dd272-9224-4d84-a7f9-e39a2c649e62} 1632 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5216
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3732 -childID 3 -isForBrowser -prefsHandle 3340 -prefMapHandle 3344 -prefsLen 22704 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {fe5120a9-870f-4427-9bd8-ea3781f95a41} 1632 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4424
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=1936 -parentBuildID 20250303093702 -sandboxingKind 0 -prefsHandle 3460 -prefMapHandle 3392 -prefsLen 25298 -prefMapSize 252221 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {f0afcdca-7bdb-4192-9f80-2019f063b7ba} 1632 utility5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5504
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=1900 -parentBuildID 20250303093702 -prefsHandle 4144 -prefMapHandle 4120 -prefsLen 25413 -prefMapSize 252221 -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {d0925bd0-c4ef-4126-8634-a9efaa0d3c11} 1632 rdd5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2372 -childID 4 -isForBrowser -prefsHandle 4000 -prefMapHandle 4004 -prefsLen 24349 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {7b23cf23-f17d-48b8-929b-2ba4190371c6} 1632 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6512
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4396 -childID 5 -isForBrowser -prefsHandle 4404 -prefMapHandle 4408 -prefsLen 24349 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {00448ef5-a8d4-462c-a016-1e90cf51230d} 1632 tab5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6544
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4592 -childID 6 -isForBrowser -prefsHandle 3376 -prefMapHandle 3268 -prefsLen 24349 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {555e5f79-3468-45cf-8d33-be30f754b938} 1632 tab5⤵
- Checks computer location settings
- Executes dropped EXE
PID:6576
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=5252 -childID 7 -isForBrowser -prefsHandle 5244 -prefMapHandle 5240 -prefsLen 24491 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {99079ff1-650f-4094-ae88-8d328f3a9884} 1632 tab5⤵
- Executes dropped EXE
PID:6264
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3080 -childID 8 -isForBrowser -prefsHandle 2328 -prefMapHandle 3272 -prefsLen 24769 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {6f1e1fb1-f0d4-4054-ba40-a0370bb65f4a} 1632 tab5⤵
- Executes dropped EXE
PID:648
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2188 -childID 9 -isForBrowser -prefsHandle 1904 -prefMapHandle 2244 -prefsLen 24769 -prefMapSize 252221 -jsInitHandle 1396 -jsInitLen 234780 -parentBuildID 20250303093702 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {533b47a9-5bfd-4e22-a40b-3fe3f2effcbd} 1632 tab5⤵
- Executes dropped EXE
PID:6032
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5500,i,10149103274116842105,12768624347989459782,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50819f2d4d4023be7a970d21dc32f7f19
SHA153dc2551d2e0c22517bbc35b9150ce46fbb1cea6
SHA256740146275a2bff1af1df4bc6bd92c056642e34a602b97296de198b159b6d69f5
SHA512693234d6d44f15c55665ce167a8d272a3f1269de56bc9ce4c819f68ce3a75bf606bd1ef6bebd798399307715c4711baf195832ceafd7c365548eef2520831a90
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5620fc1e-4c36-44a2-bf00-045df2e8a496.tmp
Filesize414B
MD55bb574705382047caa9eefcf1bcc99dc
SHA16edbb131baacefbc255d2a178283faae930e3ed7
SHA25687fd57ad0b17fe9017cce892cf5033373e2207ed38f82a2ad11114d789b58c3c
SHA51227af401e68ada8b0509a4cae278d7ca5f99d78249a6c9942c1cb24811a44251b9f25f6332015b3dfb1f9fb00a9e82c2ea3a3387647059ca0acf7d75e1f722a6a
-
Filesize
432B
MD551b51d57a3399a5ca1314f033afadac3
SHA118fea23fe0ac3cafe96e3951d70170901c80fb69
SHA256d407963aef836620156525c08bf62a1530c40be7b88229379d1d10b1350cc976
SHA51296808b4ccbf5b8b8346c6195a513b3bcf46d8775b390ffc4a16dc5e650f1a2432adbb5dba5eff61efcd3f100051bbf0a94bbd8ffb90f2f526210ec398032f8f2
-
Filesize
3KB
MD50676f6fc6ce9a8bd37f9608b726108e9
SHA1bb57ac5c35bf40dad06c53f799cec9ebdb25b740
SHA256af38051844af2e7f597c34aa26020411da3a3bbab3732db5b15e1c5ec568fb71
SHA5121ae38cabd2c6a2d31de623c5f8165962cb13c9483eb6bfd68c541f43ed817bfcf0a8fff72a3595dda106efb74b9b8fe0bf4eccb4665425a63a50944cd1cbd769
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD56c41aea41155f6aed9316dbf675ee0b7
SHA1126e13aebd921980bedb1b8cf70fef20d4d62a99
SHA256005bf92a37558bfbe4d2d5a6891d59e34bef5cd2c78fc6a964f40a4c56611233
SHA5129bbe295a941d773876a0997976d21fdd8de4532126ea9bc20bcf6c9ecca3f778bcbd91be3613c7f367bd42fe3a4b173bbaa48e73eb477bb1ace5727f7e239122
-
Filesize
11KB
MD52971d86f207f513363fa940faef81b4b
SHA1f3f0902338a0e9498930a20781c64112f8a621b0
SHA25622096d414301bcd87181ab472c083b472b04f1d2e2a71573a3724838d9a18405
SHA512a2d51a691e4624d3d5288f6a5ea366229d4455a79b25ad8e85db895d6625e9e958e1426ec1f79a2a5160cee25dbe3bb7bebc583236f0cb4141165d215e96964a
-
Filesize
15KB
MD5f754df7367882cd561491038d6ee31da
SHA169c35a2cf41f115240fd6f7dc7d070bd704f534b
SHA256aca5773b099358c4c95bc579c33bf8ff17f4e2f93919047d1f7a3e0e665ef176
SHA51224bfc1aa1d25380e39fb3c82d441642dd0df8510bb606d8774b301d2ddc5f276cfd22a104d67849c5abdcd25337055b2c638a134c72aa25397f035c22b013e56
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c1251e1c150c3cc11e9cbf766488f89f
SHA1ac608576e47ec4a7b1589c84e497ea91d525731b
SHA2561ce3147bfd65e7563b686a3a5a9e302a0caef226243ce818afdfb69f746c26cc
SHA5128f763bf9d9d66ce85476fd4cd1b459727f1735b081872015a505927520e28ebc44d2a80d02eff221069ab963ec7d350b855196279ab8c33629aeab6e1b0b156c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe596db4.TMP
Filesize48B
MD59c17e4a5e8238c7b76246eb3670f8a38
SHA1d6df4c0a7bc37c8385dd5727fe5ffe36f8190780
SHA256482509dbcfb978eef64905086fcbc7267f4ca06ded2522cd0b2007d0b78d254e
SHA512ac6724bd5a2501edc23f361a89717e30c4b0d6a0b5cbb81bc7cd2a2fa72794d8cfad3bd48f7e294889e294c62694a51a1a76ebcafff6cb61995e3568d27bb91f
-
Filesize
156KB
MD55bd594062491358cdcd6a8db31c4b7a2
SHA1e80dd8f659ffafe030f152776b15a29dab916400
SHA256ed79eaccc8391b881f428fbcab1fbb3cc875dff8085bb5aac8c484c189dc1133
SHA512ef38e8dafbb49a9d3b512b9878c646aa0e90d9233d63e192661ca6ed59022d4f47056a68228b27f18fbbc4b08f5c6d7aaa3d9ca6355a19d061936919169d484d
-
Filesize
80KB
MD5e721e53f5e125c1c13f8958a92751215
SHA1343a2d150289c4677d12388097ddd75f4602f0c0
SHA25676a528ace188f3bc753d15bc602410ee37a6fcbc40a258e73b0dbaecdc9ce531
SHA512a637cf1b9e0f34ffbaba46e5bfa2f94880c0a93ecabc9381574fff27eb04d9c1a38088a4c7923691c7b475a67bd6d5f71055d9d0d89f16a08f6d7a0ac23cd781
-
Filesize
156KB
MD5957443371da70e2f852e92d6e87e80e5
SHA1c1e79bbb203e586c638d637caad6aee4610a7057
SHA256ec3ba545f6cd8ab8c19412b850fb22159fee9ab90455c0e2bff48807d53804c4
SHA512382bf804642da8af26381ea6bdeb7c51b8c438b26ae782836739b27b52bc5d7d137bacfb768a3a59473b40fb484aeb36fadb697c2c13c8dd99f2d971e07050d1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5c81ca666e67245b726b98f2a89cffb59
SHA11a0e64d1598cc06046a8cc8ca7bdd81ec9d10dea
SHA2567a0053c526f90fe433ec6b754255cc75ee1a84714663c076530cdae3b8068cd4
SHA512b0c4ad98b341cf7bcb615ab100781e23e5e0a2c822e8b2735e82340870b833401d260f30a4b889f725825520bdcab381fd64b729671c60f81f0094a5fcb186ce
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD59888fb6b91a680305b2a3e7b71d6561d
SHA14a7935da38f88e9f74f425078ee39eb6269c4e63
SHA25681726604d47b192620bcf90d6e42ba8ee8b4c54935b0081655e08247d6b6c675
SHA512f50755e5624bfc3a60a23a7dda012509c1e31d9772d6a0ccaca88e32ae8d4602e10e38003d78b1626464502db7ea7c47d772efb7b3ea7c3e2238bf3b9809f833
-
Filesize
24KB
MD5d997606c77e880be2744c44128843d60
SHA192bb9003dc14ae03963f503e82a668877ca4295f
SHA256abb2613ff851b2cbfb61bf97e4eef9d4912abcb46e04774ad84812ab75d4dde9
SHA512714d7ce786e9fbb6f0d0e537a146a3a24aa79089669dd168b7c110dfba667fa7afb794b3dd2b93fa76e1d1771af3347a0f568cbb0fbcc8d9755de9e6e54382b3
-
Filesize
13KB
MD5bd0d7a73d0fc619e280372587e9e3115
SHA10cde473dda5d4fda8190e6460f3229cae2571af5
SHA256c7f2afe3a2424e71563e69d862dc027d299d84fba4ac1ba11e593361daec0a80
SHA512914983bfa336f9ea019bf5dc9ee403af56a6c7c1d88b8092609e4026a3377daa6ef9a8e51a93537f6769ae165c264763645a363fb6a89f8689f59caf985c18b2
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\datareporting\glean\db\data.safe.tmp
Filesize182B
MD57fba44cb533472c1e260d1f28892d86b
SHA1727dce051fc511e000053952d568f77b538107bb
SHA25614fb5cda1708000576f35c39c15f80a0c653afaf42ed137a3d31678f94b6e8bf
SHA5121330b0f39614a3af2a6f5e1ea558b3f5451a7af20b6f7a704784b139a0ec17a20c8d7b903424cb8020a003319a3d75794e9fe8bc0aeb39e81721b9b2fdb9e031
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extension-store-menus\data.safe.tmp
Filesize245B
MD5e41a948534f6e10c71ad031683c27930
SHA13869650897d89fc67cb56bc0707bd3edea1b673b
SHA25669add43c45c18dc4e408430c5730ae23138d014d197ba53001a7c5bdeaf3f539
SHA512b10e7ea994cc96246a857d8f277650c73b50aadbf6bbcc84cdc39e2742aca845f9abdf77bc722ac4351dd669fbf902a76d97c5824be898728466798a4a006c35
-
Filesize
16KB
MD53999b8f1e836730b00cdad9462ead060
SHA1a7c6ae6757feaadd6d70267d5b6e7cc78503204a
SHA256214c5673af9633cc1e51e346e56d51ea9699ec4f218aef338b9049a172ad4d8d
SHA5123fb9e53bcb02145e8bc9e7da33f46846ee83e7fa408fb37e681ec5ae31eabf12e7161f0e9dc6cb4542204976e6a9ea215d9f12a3676a2161fa8eff945441a896
-
Filesize
2KB
MD56a1f3cb4d381e6fc9834faf6e9db651e
SHA13edf60845b2f56b041c88e97b77b962fb4e444b5
SHA256227e84ba06f9cd30235df74f653cb09bbe4e398c667493ac97fef54f0455e0a1
SHA512704a3cb5e1aad4ef476e27c369b1f7eedc180d76de69df2a98b205ffb80dbc9547f6b48f93aece03927af6fc7b4c3d2b7dc4f430e07dfc6035abcd5293414362
-
Filesize
4KB
MD5220484a5328f7df7da276735e09db1d9
SHA137b0a6fc00997b690526df1a1ecd5ec48c486c3c
SHA2563bb48d737d345eec96aa3af298b7168f912f766999197ca6a525518cd2a73e38
SHA512f47e18ddbebd09ca82fe5451c02fbca0f863a209f8d8a3180c19f5ca019710def6ba8b6cac87878d27475001eb88429fb973a3d31f5776e52f09ff75e650ffd5
-
Filesize
1KB
MD5fb3069579402d7a6da95212556164385
SHA1d1e424963a6740f23987c1bac3d61a7ee0cb7e52
SHA2563fb5f35f718a56ee0cdf5c4f7a035887a88e990419cde3a7f3a3f1a2b9327a83
SHA5128a3de8fc183c5c68943b22a779418dc0c012a50949da76f5fc2de568fba7e74ac1ec81cb804bf059b3d871d292131ac24050812dae13065920aa182ad17f5d5f
-
Filesize
4KB
MD582c5e2dc48aeaec37c6f9ac7c90bd273
SHA10abea307f98ee56333fd3e75c1d0e31ee58377ac
SHA256255ee42ef15f9a473b7551f6e9f7cf5866829ab85db15f5e935c65f5715c404a
SHA512d9c93e49e091a66104a847d7b7b23f0f526b65acdf528e08a481a1c052f10168a39bb6e65dcfb3f7a0e17772d23aa64917b25d21a59e4971a065a2b98aca8550
-
Filesize
4KB
MD58fd7748bba24f5943f5c02ddc2d7fc64
SHA119a9ceed44f9f2d93ed9e943d974acd9c901be0c
SHA256c8e8985b0a2dbd827a5b212fa63379ae3336c6e535ca96c8ba65b88d400a72c0
SHA512b8ed804c9b53fa257936f4e5c5ad2a7b147e92fffc0150b5af2586d06df60cc358c9684a3c0bc264580708e8124ab8a05e88233820a93987fcaac8870dd14568
-
Filesize
5KB
MD5aa7ae7871407a3a02a86cc9c895d5ee6
SHA1012eeb2da42ec2770943b3985550fdcdee051221
SHA2567b4cc738c98f3fad3a88303432268fb0d612210919f75820c5fff9775fad6f66
SHA512091b19a15a0c0083f459d4db1b52c028cc69375cf548d9acac9297cad3567738fa5b1936ecb636ddb4739e4dafffaf32b180c2995aed6d32698bfba9641da726
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize128KB
MD5f4e600e6012c1c6ae9b6203c4a08820d
SHA156d796da475209709ecb08f4cc060ca8f93f60dd
SHA256df401982c0b1fa13fcf35698331c35c897b7d2b9d6fb48309059e2ae32965c0c
SHA512a4c4c4d3e3439178e1853877b94718781349633763b2e3654cd63ad1c5cb8b62ae850cbc3f6d4eecf9fb0012078d8d1828147c7fd1b8e8957e9aba87b6a27ff1
-
Filesize
103B
MD55b0cb2afa381416690d2b48a5534fe41
SHA15c7d290a828ca789ea3cf496e563324133d95e06
SHA25611dedeb495c4c00ad4ef2ecacbd58918d1c7910f572bbbc87397788bafca265c
SHA5120e8aafd992d53b2318765052bf3fbd5f21355ae0cbda0d82558ecbb6304136f379bb869c2f9a863496c5d0c11703dbd24041af86131d32af71f276df7c5a740e
-
Filesize
3.1MB
MD5a62fa143faa7c6f0725bef5125a9cbc5
SHA12d84b1b8c3a4fb8d6f3742b1b1d5e46fff02a8c1
SHA256527cd417e52afde83372b489b809332c97b4c9e8206e7d2089cc084641aeff66
SHA5129cfdbf41bb8106f053e5f91f86943399da1e373f2dba1525abcc0e1a509a5c08e914f72ed4eda8622165e7390eba30c23acf5cc42b838c3e4afc76b5d698856c
-
Filesize
15.6MB
MD53f3ef7ea43cc5010635d52de17b859a2
SHA19b3d4d2e8ef9e4bd47013508eea32b52daec180d
SHA256c733393aafe624c362a8301cb216f983d2fafe730bce2753b3e7bbd985feaaf0
SHA512cc26322a6326514599b66a1a8cd0e45c729b252bab1ec04c7acbdcd1042c938ebd9ede2342c5b4ab13e1266ae544e1061d927b4845beb4e05269a1f6e85f4649
-
Filesize
26.0MB
MD5a088ef8b3daeeb5c4e43f8dfc42ccb68
SHA188c53819ade27ddc0f561f88306ab170fb72b426
SHA2569950efd2e9956d88727b33172be38f3a86ca6f14b0058833ef06f38bdfe06618
SHA5120fbce7032c533bcad0b6dc627510616d9039469883d7be95ac6c7e5b78a40d5c4cda361056f7e25a0ac3194092a4c445ad12bc0956c784f55aea3dc6cc65b567
-
Filesize
429B
MD53d84d108d421f30fb3c5ef2536d2a3eb
SHA10f3b02737462227a9b9e471f075357c9112f0a68
SHA2567d9d37eff1dc4e59a6437026602f1953ef58ee46ff3d81dbb8e13b0fd0bec86b
SHA51276cb3d59b08b0e546034cbb4fb11d8cfbb80703430dfe6c9147612182ba01910901330db7f0f304a90474724f32fd7b9d102c351218f7a291d28b3a80b7ac1e5
-
Filesize
55B
MD5a515bc619743c790d426780ed4810105
SHA1355dab227f0291b2c7f1945478eec7a4248578a0
SHA256612e53338b53449be39f2e9086e15edc7bb3e7aa56c9d65a9d53b9eb3c3cc77d
SHA51248ecd83a5eb1557dfabfaf588057e86fb4b7610f6ece119d6d89a38369d1c9426027520ce5b6d1cc79a4783b9f39ac58afb360cc76e05bbe8bbbd5128c5d395b
-
C:\Users\Admin\Desktop\Tor Browser\Browser\distribution\extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi
Filesize957KB
MD562c2b654a504e5e5ae9e51319b9e6005
SHA1b8f185129557bf8cbef1640f9393f4785e95cb63
SHA256f9639e63ffcfc352036de00e4ff6694bb0ca65a0bb8fbd103bd08f32dc1ff31a
SHA51287e7c642fb4dfee08a8f1136de61fa5c1a4ea5588c31492c0e6e76f378466e4a891ba7aecb7c20e2a772cb4ce6d6ae85863906ff80597bf7d43fe1423578c405
-
Filesize
1.7MB
MD5d15121191b4363e792cfde583a227bab
SHA1a22f98cc36a92f94530be50137702b5166ef966c
SHA2563dd898ddc96775c84630b4faa3c04c981769eaa56950c4e7096a80853f236e8d
SHA512ccb0a0f05c683388d414452a5fa9e47762d3346ec9166336abff79b59f86a44560ee2923e545e278ef179d0ab6a3a9c4563d2a7eee85272324522e882ff092eb
-
Filesize
979KB
MD54f9036c6b1c34b81434c59e200b9e5a8
SHA17acb34f1078ec0516d890221c5a72ccc0fb2cb55
SHA256e014896d8f7a54eaac5feac6a6c25cfdb3b087b93a83675e30e8288011dd68a4
SHA512b0df69e8011916cf07545c13082a20853cfb83b0915be2417eaef0e246133afcb1d3887edad21edaeff328f18eaa7a3c5135f1143ac5274e37532234330a2600
-
Filesize
10.0MB
MD51440bc1351768a397782dae19ed7666b
SHA180c85fe6133458423ace2d46df16a038995531d0
SHA256758476c32d1b650e9ca49b66613cd545438f51a0827f58e8b053c149c9fe6f96
SHA512ff2d8bf0363edb28175bfcbd7e27db128e3e5a929a8583667cf456019a15e971f05b9ea7526210367b84ba995567669ebc2e25f4ec7415e7146c4a463200605a
-
Filesize
493KB
MD5554bf585e31254ad46a9ca33c697b668
SHA112f4739a91b0f875551fd274e23b2bddd79d4b7f
SHA256bc569df57841a632cd541791a95ae2ab2f6db8a3db55066a104772bfc15ee51a
SHA512f5ca77a62fdc8cd66cbdda37618d3136a323041eda32b77f4d6df545e2cccee9dd99fa56b316d11b9370f66435059cea992dd57a4c336d08ec3c22c1fe982bca
-
Filesize
1.4MB
MD50e184519a66a069553c0bf78c1da2b21
SHA1efd7a636755d40824841070e8d3981e6162e4634
SHA2563c88c7ed35ee865a5f76fb4c5f82b932d0decc546c36ba835373d0fe1e64576f
SHA512433bd66d2548123d325409485dcd78c9863965463269f98ca2a025420c7479e804d30e03cdd98cbd102239824ddb2d306c2543e18f6e92da423a35f290abe9eb
-
Filesize
2.6MB
MD5b66852f44111ead5d0b7763aa1d1c1d7
SHA12cf7f308f793c4ae492b5591bad5590fc5b1ae4c
SHA256f9add1a2a648d3b01fd56b131027a6ca670f9afadb024c7790cbe8574b604f0a
SHA51290a283fb64333d4fa679c8530b17272895ed293839a38ff501ebe2b5bdffcab9d1be5d0de4ad963592cf6c083ee4c7c9b79cf6282409f7158a9a3704edb9353e
-
Filesize
480KB
MD560ab4c4b1864579cf592da00ecbd2309
SHA12e275a5eb9e0567f7a5e902884af6031e1669d4d
SHA2560193af1cf4f4951bfd492c163f3260f4f447c5e7c700247aa3e7e70c155e5ddc
SHA512c7225e9a4fbf7649f98119d9d95b8124731cbbe593a15e8d1c1c018262b13f8357b9d1df3066be39b290df3d45600808eda245aa61e703293a710cd42fcd69ac
-
Filesize
18.6MB
MD559f8a4c56b80422a0968587651968f58
SHA141a7763af198153d4f984092b2f4d153a250fed9
SHA2565ad59a5f290d6a36b540ff864b84d477722ee10b76093b8deb9a3a3ed7f7682b
SHA512b18a571937250d8708561cf597fe32fd8065c335d4a0ee2577f9b439b100a38031cbc494e6cee7e7bd48640682b1fa85ab51925ebfde8db272543c1cecada9ac
-
Filesize
301KB
MD5cb932163d482e4169c045e53dfd4c32c
SHA133f4f81ece3cea1ce61a640fcad65b08602ef3b0
SHA256575026b8d097dc747b7a588e8b99550908ffb1dd712d078812cd25b469c9baab
SHA51216c221ccb36487859ea6f860ef4c47637d7e9c0eb283b82d3924a0947fce836b4dbe460a0b4bee22ea1a962e1caefa575bc87cdc0e66b08f09b10a3f7cec8a6d
-
Filesize
829B
MD5c269f6c3f71e77c020f66d438a618e76
SHA145288555ae885aeccb9d9e59c82d78c2915fbe86
SHA256cd23a6b6ba1faf712398be395726a5e3b22ce42493df34aaf9110d567d78321f
SHA5123247c6f898a50ca9f051a9da1a65cbd671b16222f053dbda46de7550ddb80a261a170244fac5733f129c6c0ade6b59dfd10dd1efe549dfe43bdb378f4919a128
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.cw-de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf.exe
Filesize3.4MB
MD53e3c64d90fb826c80e45d9f8791f76fe
SHA1c7c893ef8d3550c773b3523f7c35a827cb65cc5f
SHA256de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf
SHA512ad2cc2abe25800e09c2c34a8943fc5698f28b59e59fb3d89c1993666a75cec42d119bc858c4fdc5114c5ad7b2416e1479811e3047a47c679d72360a536299115