Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040D040 WriteFile,SetErrorMode,lstrlenA,CryptStringToBinaryA,CryptDecodeObjectEx,CryptAcquireContextW,CryptImportPublicKeyInfoEx,CryptEncrypt,GlobalAlloc,CryptEncrypt, | 0_2_0040D040 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040D200 VirtualAlloc,SetErrorMode,CryptAcquireContextW,CryptAcquireContextW,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext, | 0_2_0040D200 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpEnzYAtPzcmKnw41bLkkkDDmZ 1YB4weOpyx0lY8gVl0gvveTMKhmhYNzjc5uQfXH3fbGmbbdELle/u7YsdXkuNHRQ ThnFfs+q7SIw1nibfYa4c9KA4ftfr69dZTt4T/RzRzsISVNU1Q6me59k9bBqxgiy DRjJhl79BT65Ggn+uQIDAQAB -----END PUBL | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpEnzYAtPzcmKnw41bLkkkDDmZ 1YB4weOpyx0lY8gVl0gvveTMKhmhYNzjc5uQfXH3fbGmbbdELle/u7YsdXkuNHRQ ThnFfs+q7SIw1nibfYa4c9KA4ftfr69dZTt4T/RzRzsISVNU1Q6me59k9bBqxgiy DRjJhl79BT65Ggn+uQIDAQAB -----END PUBL | 0_2_0040D9F0 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpEnzYAtPzcmKnw41bLkkkDDmZ 1YB4weOpyx0lY8gVl0gvveTMKhmhYNzjc5uQfXH3fbGmbbdELle/u7YsdXkuNHRQ ThnFfs+q7SIw1nibfYa4c9KA4ftfr69dZTt4T/RzRzsISVNU1Q6me59k9bBqxgiy DRjJhl79BT65Ggn+uQIDAQAB -----END PUBL | 0_2_0040DA20 |
Source: clop ransomware.exe | Binary or memory string: -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpEnzYAtPzcmKnw41bLkkkDDmZ 1YB4weOpyx0lY8gVl0gvveTMKhmhYNzjc5uQfXH3fbGmbbdELle/u7YsdXkuNHRQ ThnFfs+q7SIw1nibfYa4c9KA4ftfr69dZTt4T/RzRzsISVNU1Q6me59k9bBqxgiy DRjJhl79BT65Ggn+uQIDAQAB -----END PUBL | |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: z: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: x: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: v: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: t: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: r: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: p: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: n: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: l: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: j: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: h: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: f: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: b: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: y: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: w: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: u: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: s: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: q: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: o: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: m: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: k: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: i: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: g: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: e: | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | File opened: c: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File opened: a: | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040B480 SetErrorMode,lstrcpyW,lstrcpyW,lstrcatW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,StrStrW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,FindClose,FindClose,lstrcpyW,lstrcatW,FindFirstFileW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcatW | 0_2_0040B480 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040BE90 SetErrorMode,lstrcpyW,lstrcpyW,lstrcatW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,StrStrW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,FindClose,FindClose,lstrcpyW,lstrcatW,StrStrW,StrStrW,FindFirstFileW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,F | 0_2_0040BE90 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040D88A FindFirstFileTransactedA, | 0_2_0040D88A |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_004046B5 FindFirstFileExA, | 0_2_004046B5 |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://fontfabrik.com |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.carterandcone.coml |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.fonts.com |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/bThe |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.founder.com.cn/cn/cThe |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.goodfont.co.kr |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.jiyu-kobo.co.jp/ |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.sajatypeworks.com |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.sakkal.com |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.sandoll.co.kr |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.tiro.com |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.typography.netD |
Source: OpenWith.exe, 00000007.00000002.2185337136.000001FB527A6000.00000002.00000001.sdmp | String found in binary or memory: http://www.zhongyicts.com.cn |
Source: clop ransomware.exe, 00000000.00000003.1956860464.0000000002BEA000.00000004.00000001.sdmp | String found in binary or memory: https://www.verivox.de/company/datenschutz/ |
Source: C:\Users\user\Desktop\clop ransomware.exe | File deleted: C:\Users\user\Desktop\HMPPSXQPQV.pdf | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File deleted: C:\Users\user\Desktop\LIJDSFKJZG.xlsx | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File deleted: C:\Users\user\Desktop\HMPPSXQPQV.docx | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File deleted: C:\Users\user\Desktop\LFOPODGVOH.docx | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040A0E5 | 0_2_0040A0E5 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_00433045 | 0_2_00433045 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0043215D | 0_2_0043215D |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_004332C0 | 0_2_004332C0 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_00431C32 | 0_2_00431C32 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_00432CAC | 0_2_00432CAC |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_004335C5 | 0_2_004335C5 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0042CEDC | 0_2_0042CEDC |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_004326A1 | 0_2_004326A1 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: String function: 0042B330 appears 32 times | |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: String function: 0040D8D0 appears 44 times | |
Source: clop ransomware.exe, 00000000.00000002.2163380138.0000000000980000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs clop ransomware.exe |
Source: clop ransomware.exe, 00000000.00000002.2162402654.0000000000490000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamempr.dll.muij% vs clop ransomware.exe |
Source: clop ransomware.exe, 00000000.00000002.2165305205.0000000002A50000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs clop ransomware.exe |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: drprov.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: ntlanman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: davclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: davhlpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: browcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: 00000006.00000002.2167138375.0000025640508000.00000004.00000020.sdmp, type: MEMORY | Matched rule: Ransom_LockerGoga_Mar19_1 date = 2019-03-19, hash3 = bdf36127817413f625d2625d3133760af724d6ad2410bea7297ddc116abc268f, hash2 = 7bcd69b3085126f7e97406889f78ab74e87230c11812b79406d723a80c08dd26, hash1 = c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15, author = Florian Roth, description = Detects LockerGoga ransomware binaries, reference = https://www.nrk.no/norge/skreddersydd-dobbeltangrep-mot-hydro-1.14480202, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040D8D0 GetCurrentThread,Sleep,CreateToolhelp32Snapshot,lstrcpyW,lstrcpyW,lstrlenW,CharUpperBuffW,CloseHandle,Process32FirstW,lstrcpyW,lstrlenW,CharUpperBuffW,lstrcmpW,OpenProcess,TerminateProcess,CloseHandle,lstrcpyW,Process32NextW,CloseHandle, | 0_2_0040D8D0 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040DAA0 StrStrW,SetErrorMode,wsprintfW,CreateFileW,CloseHandle,lstrcmpW,GetModuleHandleW,FindResourceW,LoadResource,LockResource,SizeofResource,GlobalAlloc,CreateFileW,WriteFile,CloseHandle,GlobalFree, | 0_2_0040DAA0 |
Source: C:\Windows\System32\OpenWith.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:14160:120:WilError_01 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Mutant created: \Sessions\1\BaseNamedObjects\CLOP#666 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: popup.txt | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: //...// | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: 1234567890 | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: zoolz.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: mysqld-nt.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: syntime.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: agntsv.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: mysqld-opt.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: tbirdonfig.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: dbeng50.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: oautoupds.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: thebat.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: dbsnmp.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: oomm.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: thebat64.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: ensv.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: ossd.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: thunderbird.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: exel.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: onenote.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: visio.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: orale.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: winword.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: infopath.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: outlook.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: wordpad.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: isqlplussv.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: powerpnt.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: xfssvon.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: msaess.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: tmlisten.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: msftesql.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: sqlagent.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: PNTMon.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: mspub.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: sqlbrowser.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: NTAoSMgr.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: sqlservr.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: Ntrtsan.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: sqlwriter.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: mbamtray.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: mysqld.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: steam.exe | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: CLOP#666 | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: %c: | 0_2_0040D450 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Command line argument: *.* | 0_2_0040D450 |
Source: unknown | Process created: C:\Users\user\Desktop\clop ransomware.exe 'C:\Users\user\Desktop\clop ransomware.exe' |
Source: unknown | Process created: C:\Windows\System32\notepad.exe 'C:\Windows\system32\NOTEPAD.EXE' C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ClopReadMe.txt |
Source: unknown | Process created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\$Recycle.Bin\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\$Recycle.Bin\S-1-5-18\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\$Recycle.Bin\S-1-5-21-58933367-3072710494-194312298-1001\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\$Recycle.Bin\S-1-5-21-58933367-3072710494-194312298-1002\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\All Users\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\Local\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\Local\Application Data\Application Data\History\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\Local\Application Data\Application Data\Microsoft\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\Local\Application Data\Application Data\Temp\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\Local\Application Data\Temporary Internet Files\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\Roaming\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\AppData\Roaming\Microsoft\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Cookies\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Documents\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Documents\My Music\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Documents\My Pictures\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Documents\My Videos\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Downloads\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Favorites\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Links\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\NetHood\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\PrintHood\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Recent\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Saved Games\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\SendTo\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\Accessibility\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\Accessories\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\desktop.ini.Clop | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\Accessibility\Desktop.ini.Clop | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\Accessibility\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\Accessories\Desktop.ini.Clop | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | File created: C:\Documents and Settings\Default\Start Menu\Programs\Accessories\ClopReadMe.txt | Jump to behavior |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040B480 SetErrorMode,lstrcpyW,lstrcpyW,lstrcatW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,StrStrW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,FindClose,FindClose,lstrcpyW,lstrcatW,FindFirstFileW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcatW | 0_2_0040B480 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040BE90 SetErrorMode,lstrcpyW,lstrcpyW,lstrcatW,lstrcatW,lstrcpyW,lstrcatW,FindFirstFileW,StrStrW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,lstrcmpW,lstrcmpW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,wsprintfW,lstrcpyA,lstrcpyW,lstrcpyW,CreateThread,WaitForSingleObject,FindNextFileW,FindClose,FindClose,lstrcpyW,lstrcatW,StrStrW,StrStrW,FindFirstFileW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,StrStrW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,F | 0_2_0040BE90 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_0040D88A FindFirstFileTransactedA, | 0_2_0040D88A |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_004046B5 FindFirstFileExA, | 0_2_004046B5 |
Source: clop ransomware.exe, 00000000.00000002.2165305205.0000000002A50000.00000002.00000001.sdmp | Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed. |
Source: clop ransomware.exe, 00000000.00000002.2165305205.0000000002A50000.00000002.00000001.sdmp | Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service. |
Source: clop ransomware.exe, 00000000.00000002.2165305205.0000000002A50000.00000002.00000001.sdmp | Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported. |
Source: clop ransomware.exe, 00000000.00000002.2165305205.0000000002A50000.00000002.00000001.sdmp | Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service. |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_00401832 SetUnhandledExceptionFilter, | 0_2_00401832 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_00401241 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00401241 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_00404274 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00404274 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_004016E4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_004016E4 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: 0_2_004256A5 SetUnhandledExceptionFilter, | 0_2_004256A5 |
Source: clop ransomware.exe, 00000000.00000002.2163488807.0000000000D60000.00000002.00000001.sdmp, notepad.exe, 00000006.00000002.2167807411.0000025640AF0000.00000002.00000001.sdmp, OpenWith.exe, 00000007.00000002.2181016027.000001FB4E530000.00000002.00000001.sdmp | Binary or memory string: Program Manager |
Source: clop ransomware.exe, 00000000.00000002.2163488807.0000000000D60000.00000002.00000001.sdmp, notepad.exe, 00000006.00000002.2167807411.0000025640AF0000.00000002.00000001.sdmp, OpenWith.exe, 00000007.00000002.2181016027.000001FB4E530000.00000002.00000001.sdmp | Binary or memory string: Shell_TrayWnd |
Source: clop ransomware.exe, 00000000.00000002.2163488807.0000000000D60000.00000002.00000001.sdmp, notepad.exe, 00000006.00000002.2167807411.0000025640AF0000.00000002.00000001.sdmp, OpenWith.exe, 00000007.00000002.2181016027.000001FB4E530000.00000002.00000001.sdmp | Binary or memory string: Progman |
Source: clop ransomware.exe, 00000000.00000002.2163488807.0000000000D60000.00000002.00000001.sdmp, notepad.exe, 00000006.00000002.2167807411.0000025640AF0000.00000002.00000001.sdmp, OpenWith.exe, 00000007.00000002.2181016027.000001FB4E530000.00000002.00000001.sdmp | Binary or memory string: Progmanlock |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,___crtGetLocaleInfoA, | 0_2_00435378 |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,___crtGetLocaleInfoA, | 0_2_0043537C |
Source: C:\Users\user\Desktop\clop ransomware.exe | Code function: __crtGetLocaleInfoA_stat, | 0_2_0043672A |
Source: C:\Windows\System32\notepad.exe | Queries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ClopReadMe.txt VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Queries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Queries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Queries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\OpenWith.exe | Queries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformation | Jump to behavior |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.