File name:

HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.7z

Full analysis: https://app.any.run/tasks/ff273438-63e1-4649-9919-9923a1cd5a99
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 26, 2025, 19:48:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
arch-exec
ransomware
locky
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

D5547D616A0C0367038BAD85986DA603

SHA1:

457406001B3B61A21BAA2E2907D234015C851DCC

SHA256:

1E2D483B314E0BF4D635D713645D281589332D869D915D271B8415C93DE33BC4

SSDEEP:

6144:S+4WDB9fdroo5KrNK6an9bKrmtDI1cSECKg:S+5Pfdrd5QKD9Smt8JECKg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 2452)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
    • The process creates files with name similar to system file names

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
    • Executable content was dropped or overwritten

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • Application launched itself

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
    • Reads the Internet Settings

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3004)
    • Creates file in the systems drive root

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • There is functionality for taking screenshot (YARA)

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • Starts CMD.EXE for commands execution

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • Changes the desktop background image

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2452)
    • Reads the computer name

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 2452)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • Checks supported languages

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • Manual execution by a user

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
      • msedge.exe (PID: 3248)
    • Create files in a temporary directory

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
    • Reads the machine GUID from the registry

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 2740)
    • Checks proxy server information

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
    • Application launched itself

      • msedge.exe (PID: 3248)
      • msedge.exe (PID: 2312)
    • Creates files in the program directory

      • HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe (PID: 1120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2016:12:03 10:42:42+00:00
ArchivedFileName: HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
64
Monitored processes
22
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe heur-trojan-ransom.win32.agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe heur-trojan-ransom.win32.agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe svchost.exe vssvc.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs PhotoViewer.dll no specs cmd.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1060"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1264,i,13672492953384206264,4324732408179927360,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1120"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
User:
admin
Company:
X2Go Project
Integrity Level:
HIGH
Description:
Installer for X2Go Client for Windows
Exit code:
0
Version:
1.3.0.4
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.win32.agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1588"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=1520 --field-trial-handle=1264,i,13672492953384206264,4324732408179927360,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1880"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4144 --field-trial-handle=1264,i,13672492953384206264,4324732408179927360,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2068"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --first-renderer-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1264,i,13672492953384206264,4324732408179927360,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2244"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd8,0x6e59f598,0x6e59f5a8,0x6e59f5b4C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2312"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\admin\Desktop\-INSTRUCTION.htmlC:\Program Files\Microsoft\Edge\Application\msedge.exeHEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2324C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2452"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
7 455
Read events
7 362
Write events
83
Delete events
10

Modification events

(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2452) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1080) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
D4DA6D3E3157
(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.7z
(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2452) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
Executable files
4
Suspicious files
515
Text files
625
Unknown types
0

Dropped files

PID
Process
Filename
Type
1120HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\Desktop\_2-INSTRUCTION.htmlhtml
MD5:4206292033C25B1300DE616B76830BA4
SHA256:893F7E248912692D6C182D350B20B227D6F69F35B81017EF615E01C74AB646C0
1120HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\Documents\OneNote Notebooks\Personal\NIFPE38N-EX56-RUCB-8B47-A777E2650BDA.zzzzzbinary
MD5:204ADD72E85EE70C7FBD055E39A1D205
SHA256:486674F32EC6DBF09EB7F26F7C3C10B6C5ABB3A769D5E344A9D589B161D68862
2740HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\AppData\Local\Temp\wp-login.phphtml
MD5:850891FBB33993E18BD5EE8593374542
SHA256:6C22286E19DF241AF089BDFEC47864ECB7196B734290E44266439512541BEA48
2740HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\AppData\Local\Temp\nsv411C.tmpbinary
MD5:0019C0932197F60F396848F71498DC53
SHA256:2F878932F9D2B4744F2F4E81AAD9EB240011E27003AA0F66317065BCE6A6827A
2740HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\AppData\Local\Temp\nsq414C.tmp\System.dllexecutable
MD5:A4DD044BCD94E9B3370CCF095B31F896
SHA256:2E226715419A5882E2E14278940EE8EF0AA648A3EF7AF5B3DC252674111962BC
1120HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\Documents\Outlook Files\NIFPE38N-EX56-RUCB-5C49-54156941A02B.zzzzzbinary
MD5:BE3DAB17B8FCA7566FFB0A9E3EF0BC8D
SHA256:718578ECB833C4526630488CB9C7F41108F66BBA0C54E63B636CC9911339CA63
2740HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\AppData\Local\Temp\LaJJJGdIpQSiVEh0EVtgM4ag.Gybinary
MD5:16A7ADF5025B2257ACCDD2AF90783FB0
SHA256:02F5B4C31144F04F41F4B0FE704B046FB2B364F3085BF4BD86942EB69FE57FAE
1120HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\Documents\OneNote Notebooks\Personal\_0-INSTRUCTION.htmlhtml
MD5:4206292033C25B1300DE616B76830BA4
SHA256:893F7E248912692D6C182D350B20B227D6F69F35B81017EF615E01C74AB646C0
1120HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\Documents\Outlook Files\NIFPE38N-EX56-RUCB-2CBF-D353A71805CA.zzzzzbinary
MD5:21CC8FF20FE6574731A46D01B7A91C9B
SHA256:D9DD4E0DD6E550118E5C8EEDD0409AAD7081FFD66DA41B34A48C4C9A28416845
2740HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exeC:\Users\admin\AppData\Local\Temp\racollection1243239085.mixedtext
MD5:B7CB86B65CD716CF88AB1704C36BA580
SHA256:4CBA76F6C0C0760078F3ED8991C068158BF0A922522FF73F1142BBBF6D0043C7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
17
DNS requests
21
Threats
3

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1120
HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
95.213.195.123:80
OOO Network of data-centers Selectel
RU
unknown
1120
HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
91.142.90.61:80
Miran Ltd.
RU
unknown
3248
msedge.exe
239.255.255.250:1900
whitelisted
2984
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2984
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2984
msedge.exe
104.126.37.136:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
jdoygbadyxna.xyz
unknown
tvfnmfxa.pw
unknown
sfxjivgoghbq.biz
unknown
yodgjevnfhn.pw
unknown
avyheosvmwewlxaxd.pw
unknown
mltysllcfn.su
unknown
ombnkfypqxhpa.info
unknown
xufgsnnahmpfr.biz
unknown
qxjgygyvrrhgfx.xyz
unknown

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
Process
Message
msedge.exe
[0426/205204.149:ERROR:exception_handler_server.cc(527)] ConnectNamedPipe: The pipe is being closed. (0xE8)