{"id":52681,"date":"2023-07-06T17:00:00","date_gmt":"2023-07-06T17:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/"},"modified":"2023-07-06T17:00:00","modified_gmt":"2023-07-06T17:00:00","slug":"the-five-day-job-a-blackbyte-ransomware-intrusion-case-study","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/","title":{"rendered":"The five-day job: A BlackByte ransomware intrusion case study"},"content":{"rendered":"<p>As ransomware attacks continue to grow in number and sophistication, threat actors can quickly impact business operations if organizations are not well prepared. In a recent investigation by Microsoft Incident Response (previously known as Microsoft Detection and Response Team \u2013 DART) of an intrusion, we found that the threat actor progressed through the full attack chain, from initial access to impact, in less than five days, causing significant business disruption for the victim organization.<\/p>\n<p>Our investigation found that within those five days, the threat actor employed a range of tools and techniques, culminating in the deployment of BlackByte 2.0 ransomware, to achieve their objectives. These techniques included:<\/p>\n<ul>\n<li>Exploitation of unpatched internet-exposed Microsoft Exchange Servers<\/li>\n<li>Web shell deployment facilitating remote access<\/li>\n<li>Use of living-off-the-land tools for persistence and reconnaissance<\/li>\n<li>Deployment of Cobalt Strike beacons for command and control (C2)<\/li>\n<li>Process hollowing and the use of vulnerable drivers for defense evasion<\/li>\n<li>Deployment of custom-developed backdoors to facilitate persistence<\/li>\n<li>Deployment of a custom-developed data collection and exfiltration tool<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-1024x514.webp\" alt=\"BlackByte 2.0 ransomware attack chain by order of stages: initial access and privilege escalation, persistence and command and control, reconnaissance, credential access, lateral movement, data staging and exfiltration, and impact. \" class=\"wp-image-130823 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-1024x514.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-300x150.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-768x385.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-1536x770.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-2048x1027.webp 2048w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-1024x514.webp\"><figcaption class=\"wp-element-caption\">Figure 1. BlackByte 2.0 ransomware attack chain<\/figcaption><\/figure>\n<p>In this blog, we share details of our investigation into the end-to-end attack chain, exposing security weaknesses that the threat actor exploited to advance their attack. As we learned from Microsoft\u2019s tracking of ransomware attacks and the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/\">cybercriminal economy<\/a> that enables them, disrupting common attack patterns could stop many of the attacker activities that precede ransomware deployment. This case highlights that common security hygiene practices go a long way in preventing, identifying, and responding to malicious activity as early as possible to mitigate the impact of ransomware attacks. We encourage organizations to follow the outlined mitigation steps, including ensuring that internet-facing assets are up to date and configured securely. We also share indicators of compromise, detection details, and hunting guidance to help organizations identify and respond to these attacks in their environments. &nbsp;<\/p>\n<h2 class=\"wp-block-heading\">Forensic analysis<\/h2>\n<h3 class=\"wp-block-heading\">Initial access and privilege escalation<\/h3>\n<p>To obtain initial access into the victim\u2019s environment, the threat actor was observed exploiting the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/proxyshell-vulnerabilities-and-your-exchange-server\/ba-p\/2684705\">ProxyShell vulnerabilities<\/a> CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207 on unpatched Microsoft Exchange Servers. The exploitation of these vulnerabilities allowed the threat actor to:<\/p>\n<ul>\n<li>Attain system-level privileges on the compromised Exchange host<\/li>\n<li>Enumerate LegacyDN of users by sending Autodiscover requests, including SIDs of users<\/li>\n<li>Construct a valid authentication token and use it against the Exchange PowerShell backend<\/li>\n<li>Impersonate domain admin users and create a web shell by using the <em>New-MailboxExportRequest<\/em> cmdlet<\/li>\n<li>Create web shells to obtain remote control on affected servers<\/li>\n<\/ul>\n<p>The threat actor was observed operating from the following IP to exploit ProxyShell and access the web shell:<\/p>\n<ul>\n<li>185.225.73[.]244<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Persistence<\/h3>\n<p><strong>Backdoor<\/strong><\/p>\n<p>After gaining access to a device, the threat actor created the following registry run keys to run a payload each time a user signs in:<\/p>\n<figure class=\"wp-block-table table\">\n<table class=\"has-fixed-layout\">\n<tbody readability=\"7.5\">\n<tr>\n<td>Registry key<\/td>\n<td>Value name<\/td>\n<td>Value data<\/td>\n<\/tr>\n<tr readability=\"5\">\n<td>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &nbsp;<\/td>\n<td>MsEdgeMsE<\/td>\n<td>rundll32 C:\\Users\\user\\Downloads\\api-msvc.dll,Default &nbsp;<\/td>\n<\/tr>\n<tr readability=\"5\">\n<td>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &nbsp;<\/td>\n<td>MsEdgeMsE<\/td>\n<td>rundll32 C:\\temp\\api-msvc.dll,Default &nbsp;<\/td>\n<\/tr>\n<tr readability=\"5\">\n<td>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &nbsp;<\/td>\n<td>MsEdgeMsE<\/td>\n<td>rundll32 C:\\systemtest\\api-system.png,Default<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>The file <em>api-msvc.dll <\/em>(SHA-256: 4a066569113a569a6feb8f44257ac8764ee8f2011765009fdfd82fe3f4b92d3e) was determined to be a backdoor capable of collecting system information, such as the installed antivirus products, device name, and IP address. This information is then sent via HTTP POST request to the following C2 channel:<\/p>\n<ul>\n<li><em>hxxps:\/\/myvisit[.]alteksecurity[.]org\/t<\/em><\/li>\n<\/ul>\n<p>The organization was not using Microsoft Defender Antivirus, which detects this malware as Trojan:Win32\/Kovter!MSR, as the primary antivirus solution, and the backdoor was allowed to run.<\/p>\n<p>An additional file, <em>api-system.png<\/em>, was identified to have similarities to <em>api-msvc.dll<\/em>. This file behaved like a DLL, had the same default export function, and also leveraged run keys for persistence.<\/p>\n<p><strong>Cobalt Strike Beacon<\/strong><\/p>\n<p>The threat actor leveraged Cobalt Strike to achieve persistence. The file <em>sys.exe <\/em>(SHA-256: 5f37b85687780c089607670040dbb3da2749b91b8adc0aa411fd6280b5fa7103), detected by Microsoft Defender Antivirus as Trojan:Win64\/CobaltStrike!MSR, was determined to be a Cobalt Strike Beacon and was downloaded directly from the file sharing service <em>temp[.]sh<\/em>:<\/p>\n<ul>\n<li><em>hxxps:\/\/temp[.]sh\/szAyn\/sys.exe<\/em><\/li>\n<\/ul>\n<p>This beacon was configured to communicate with the following C2 channel:<\/p>\n<ul>\n<li>109.206.243[.]59:443<\/li>\n<\/ul>\n<p><strong>AnyDesk<\/strong><strong><\/strong><\/p>\n<p>Threat actors leverage legitimate remote access tools during intrusions to blend into a victim network. In this case, the threat actor utilized the remote administration tool AnyDesk, to maintain persistence and move laterally within the network. AnyDesk was installed as a service and was run from the following paths:<\/p>\n<ul>\n<li><em>C:\\systemtest\\anydesk\\AnyDesk.exe<\/em><\/li>\n<li><em>C:\\Program Files (x86)\\AnyDesk\\AnyDesk.exe<\/em><\/li>\n<li><em>C:\\Scripts\\AnyDesk.exe<\/em><\/li>\n<\/ul>\n<p>Successful connections were observed in the AnyDesk log file <em>ad_svc.trace<\/em> involving anonymizer service IP addresses linked to TOR and MULLVAD VPN, a common technique that threat actors employ to obscure their source IP ranges.<\/p>\n<h3 class=\"wp-block-heading\">Reconnaissance<\/h3>\n<p>We found the presence and execution of the network discovery tool NetScan being used by the threat actor to perform network enumeration using the following file names:<\/p>\n<ul>\n<li><em>netscan.exe <\/em>(SHA-256:1b9badb1c646a19cdf101ac4f6fdd23bc61eaab8c9f925eb41848cea9fd0738e)<\/li>\n<li><em>netapp.exe <\/em>(SHA-256:1b9badb1c646a19cdf101ac4f6fdd23bc61eaab8c9f925eb41848cea9fd0738e)<\/li>\n<\/ul>\n<p>Additionally, execution of AdFind (SHA-256: f157090fd3ccd4220298c06ce8734361b724d80459592b10ac632acc624f455e), an Active Directory reconnaissance tool, was observed in the environment.<\/p>\n<h3 class=\"wp-block-heading\">Credential access<\/h3>\n<p>Evidence of likely usage of the credential theft tool Mimikatzwas also uncovered through the presence of a related log file <em>mimikatz.log<\/em>. Microsoft IR assesses that Mimikatz was likely used to attain credentials for privileged accounts.<\/p>\n<h3 class=\"wp-block-heading\">Lateral movement<\/h3>\n<p>Using compromised domain admin credentials, the threat actor used Remote Desktop Protocol (RDP) and PowerShell remoting to obtain access to other servers in the environment, including domain controllers.<\/p>\n<h3 class=\"wp-block-heading\">Data staging and exfiltration<\/h3>\n<p>In one server where Microsoft Defender Antivirus was installed, a suspicious file named <em>explorer.exe<\/em> was identified, detected as Trojan:Win64\/WinGoObfusc.LK!MT, and quarantined. However, because tamper protection wasn\u2019t enabled on this server, the threat actor was able to disable the Microsoft Defender Antivirus service, enabling the threat actor to run the file using the following command:<\/p>\n<p>explorer.exe P@$$w0rd<\/p>\n<p>After reverse engineering<em> explorer.exe<\/em>, we determined it to be ExByte, a GoLang-based tool developed and commonly used in BlackByte ransomware attacks for collection and exfiltration of files from victim networks. This tool is capable of enumerating files of interest across the network and, upon execution, creates a log file containing a list of files and associated metadata. Multiple log files were uncovered during the investigation in the path:<\/p>\n<ul>\n<li><em>C:\\Exchange\\MSExchLog.log<\/em><\/li>\n<\/ul>\n<p>Analysis of the binary revealed a list of file extensions that are targeted for enumeration.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"521\" height=\"110\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/Figure-2.-Binary-analysis-showing-file-extensions-enumerated-by-explorer.exe_.jpg\" alt=\"Figure-2.-Binary-analysis-showing-file-extensions-enumerated-by-explorer.exe_\" class=\"wp-image-130824\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/Figure-2.-Binary-analysis-showing-file-extensions-enumerated-by-explorer.exe_.jpg 521w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/Figure-2.-Binary-analysis-showing-file-extensions-enumerated-by-explorer.exe_-300x63.jpg 300w\" sizes=\"auto, (max-width: 521px) 100vw, 521px\"><figcaption class=\"wp-element-caption\">Figure 2. Binary analysis showing file extensions enumerated by <em>explorer.exe<\/em><\/figcaption><\/figure>\n<p>Forensic analysis identified a file named <em>data.txt<\/em> that was created and later deleted after ExByte execution. This file contained obfuscated credentials that ExByte leveraged to authenticate to the popular file sharing platform Mega NZ using the platform\u2019s API at:<\/p>\n<ul>\n<li><em>hxxps:\/\/g.api.mega.co[.]nz<\/em><\/li>\n<\/ul>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/Figure-3.-Binary-analysis-showing-explorer.exe-functionality-for-connecting-to-file-sharing-service-MEGA-NZ.webp\" alt class=\"wp-image-130825 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/Figure-3.-Binary-analysis-showing-explorer.exe-functionality-for-connecting-to-file-sharing-service-MEGA-NZ.webp\"><figcaption class=\"wp-element-caption\">Figure 3. Binary analysis showing explorer.exe functionality for connecting to file sharing service MEGA NZ<\/figcaption><\/figure>\n<p>We also determined that this version of Exbyte was crafted specifically for the victim, as it contained a hardcoded device name belonging to the victim and an internal IP address.<\/p>\n<p><strong>ExByte execution flow<\/strong><\/p>\n<p>Upon execution, ExByte decodes several strings and checks if the process is running with privileged access by reading <em>\\\\.\\PHYSICALDRIVE0<\/em>:<\/p>\n<ul>\n<li>If this check fails, <em>ShellExecuteW<\/em> is invoked with the <em>IpOperation<\/em> parameter <em>RunAs<\/em>, which runs <em>explorer.exe<\/em> with elevated privileges.<\/li>\n<\/ul>\n<p>After this access check, <em>explorer.exe<\/em> attempts to read the <em>data.txt<\/em> file in the current location:<\/p>\n<ul>\n<li>If the text file doesn\u2019t exist, it invokes a command for self-deletion and exits from memory:<\/li>\n<\/ul>\n<div class=\"wp-block-syntaxhighlighter-code \" readability=\"7\">\n<pre class=\"brush: plain; gutter: false; title: ; notranslate\" title>\nC:\\Windows\\system32\\cmd.exe \/c ping 1.1.1.1 -n 10 &gt; nul &amp; Del &lt;PATH&gt;\\explorer.exe \/F \/Q\n<\/pre>\n<\/div>\n<ul>\n<li>If <em>data.txt<\/em> exists, <em>explorer.exe<\/em> reads the file, passes the buffer to Base64 decode function, and then decrypts the data using the key provided in the command line. The decrypted data is then parsed as JSON below and fed for login function:<\/li>\n<\/ul>\n<div class=\"wp-block-syntaxhighlighter-code \" readability=\"8\">\n<pre class=\"brush: plain; gutter: false; title: ; notranslate\" title>\n{ \u201ca\u201d:\u201dus0\u201d, \u201cuser\u201d:\u201d&lt;CONTENT FROM data.txt&gt;\u201d\n}\n<\/pre>\n<\/div>\n<p>Finally, it forms a URL for sign-in to the API of the service MEGA NZ:<\/p>\n<ul>\n<li><em>hxxps:\/\/g.api.mega.co[.]nz\/cs?id=1674017543<\/em><\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Data encryption and destruction<\/h3>\n<p>On devices where files were successfully encrypted, we identified suspicious executables, detected by Microsoft Defender Antivirus as Trojan:Win64\/BlackByte!MSR, with the following names:<\/p>\n<ul>\n<li><em>wEFT.exe<\/em><\/li>\n<li><em>schillerized.exe<\/em><\/li>\n<\/ul>\n<p>The files were analyzed and determined to be BlackByte 2.0 binaries responsible for encryption across the environment. The binaries require an 8-digit key number to encrypt files.<\/p>\n<p>Two modes of execution were identified:<\/p>\n<ul>\n<li>When the <em>-s<\/em> parameter is provided, the ransomware self-deletes and encrypts the machine it was executed on.<\/li>\n<li>When the <em>-a<\/em> parameter is provided, the ransomware conducts enumeration and uses an Ultimate Packer Executable (UPX) packed version of PsExec to deploy across the network. Several domain admin credentials were hardcoded in the binary, facilitating the deployment of the binary across the network.<\/li>\n<\/ul>\n<p>Depending on the switch (<em>-s<\/em> or <em>-a<\/em>), execution may create the following files:<\/p>\n<ul>\n<li><em>C:\\SystemData\\M8yl89s7.exe<\/em> (UPX-packed PsExec with a random name; SHA-256: ba3ec3f445683d0d0407157fda0c26fd669c0b8cc03f21770285a20b3133098f)<\/li>\n<li><em>C:\\SystemData\\wEFT.exe<\/em> (Additional BlackByte binary)<\/li>\n<li><em>C:\\SystemData\\MsExchangeLog1.log<\/em> (Log file)<\/li>\n<li><em>C:\\SystemData\\rENEgOtiAtES <\/em>(A vulnerable (CVE-2019-16098) driver <em>RtCore64.sys<\/em> used to evade detection by installed antivirus software; SHA-256: 01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd)<\/li>\n<li><em>C:\\SystemData\\iHu6c4.ico<\/em> (Random name \u2013 BlackBytes icon)<\/li>\n<li><em>C:\\SystemData\\BB_Readme_file.txt<\/em> (BlackByte ReadMe file)<\/li>\n<li><em>C:\\SystemData\\skip_bypass.txt<\/em> (Unknown)<\/li>\n<\/ul>\n<p><strong>BlackByte 2.0 ransomware capabilities<\/strong><\/p>\n<p>Some capabilities identified for the BlackByte 2.0 ransomware were:<\/p>\n<ul>\n<li>Antivirus bypass\n<ul>\n<li>The file <em>rENEgOtiAtES<\/em> created matches <em>RTCore64.sys<\/em>, a vulnerable driver (CVE-2049-16098) that allows any authenticated user to read or write to arbitrary memory<\/li>\n<\/ul>\n<ul>\n<li>The BlackByte binary then creates and starts a service named <em>RABAsSaa<\/em> calling <em>rENEgOtiAtES<\/em>, and exploits this service to evade detection by installed antivirus software<\/li>\n<\/ul>\n<\/li>\n<li>Process hollowing\n<ul>\n<li>Invokes <em>svchost.exe<\/em>, injects to it to complete device encryption, and self-deletes by executing the following command:\n<ul>\n<li><code>cmd.exe \/c ping 1.1.1.1 -n 10 &gt; Nul &amp; Del \u201cPATH_TO_BLACKBYTE\u201d \/F \/Q<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Modification \/ disabling of Windows Firewall\n<ul>\n<li>The following commands are executed to either modify existing Windows Firewall rules, or to disable Windows Firewall entirely:\n<ul>\n<li><code>cmd \/c netsh advfirewall set allprofiles state off<\/code><\/li>\n<\/ul>\n<\/li>\n<li>\n<ul>\n<li><code>cmd \/c netsh advfirewall firewall set rule group=\u201dFile and Printer Sharing\u201d new enable=Yes<\/code><\/li>\n<\/ul>\n<ul>\n<li><code>cmd \/c netsh advfirewall firewall set rule group=\u201dNetwork Discovery\u201d new enable=Yes<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Modification of volume shadow copies\n<ul>\n<li>The following commands are executed to destroy volume shadow copies on the machine:\n<ul>\n<li><code>cmd \/c vssadmin Resize ShadowStorge \/For=B:\\ \/On=B:\\ \/MaxSize=401MB<\/code><\/li>\n<\/ul>\n<ul>\n<li><code>cmd \/c vssadmin Resize ShadowStorage \/For=B:\\ \/On=B:\\ \/MaxSize=UNBOUNDED<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Modification of registry keys\/values\n<ul>\n<li>The following commands are executed to modify the registry, facilitating elevated execution on the device:\n<ul>\n<li><code>cmd \/c reg add HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System \/v LocalAccountTokenFilterPolicy \/t REG_DWORD \/d 1 \/f<\/code><\/li>\n<\/ul>\n<\/li>\n<li>\n<ul>\n<li><code>cmd \/c reg add HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System \/v EnableLinkedConnections \/t REG_DWORD \/d 1 \/f<\/code><\/li>\n<\/ul>\n<ul>\n<li><code>cmd \/c reg add HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Control\\\\FileSystem \/v LongPathsEnabled \/t REG_DWORD \/d 1 \/f<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Additional functionality\n<ul>\n<li>Ability to terminate running services and processes<\/li>\n<\/ul>\n<ul>\n<li>Ability to enumerate and mount volumes and network shares for encryption<\/li>\n<\/ul>\n<ul>\n<li>Perform anti-forensics technique timestomping (sets the file time of encrypted and ReadMe file to 2000-01-01 00:00:00)<\/li>\n<\/ul>\n<ul>\n<li>Ability to perform anti-debugging techniques<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Recommendations<\/h2>\n<p>To guard against BlackByte ransomware attacks, Microsoft recommends the following:<\/p>\n<ul>\n<li>Ensure that you have a patch management process in place and that patching for internet-exposed devices is prioritized; Understand and assess your cyber exposure with advanced vulnerability and configuration assessment tools like <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-vulnerability-management\/defender-vulnerability-management?view=o365-worldwide\">Microsoft Defender Vulnerability Management<strong><em> <\/em><\/strong><\/a><strong><em><\/em><\/strong><\/li>\n<li>Implement an endpoint detection and response (EDR) solution like <a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint\">Microsoft Defender for Endpoint<\/a> to gain visibility into malicious activity in real time across your network<\/li>\n<li>Ensure antivirus protections are updated regularly by <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/configure-block-at-first-sight-microsoft-defender-antivirus?view=o365-worldwide\">turning on cloud-based protection<\/a> and that your antivirus solution is configured to block threats<\/li>\n<li>Enable <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/prevent-changes-to-security-settings-with-tamper-protection?view=o365-worldwide\">tamper protection<\/a> to prevent components of Microsoft Defender Antivirus from being disabled<\/li>\n<li>Block inbound traffic from IPs specified in the indicators of compromise section of this report<\/li>\n<li>Block inbound traffic from TOR exit nodes<\/li>\n<li>Block inbound access from unauthorized public VPN services<\/li>\n<li>Restrict administrative privileges to prevent authorized system changes<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n<p>BlackByte ransomware attacks target organizations that have infrastructure with unpatched vulnerabilities. &nbsp;As outlined in the <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-digital-defense-report-2022\">Microsoft Digital Defense Report<\/a>, common security hygiene practices, including keeping systems up to date, could protect against 98% of attacks.<\/p>\n<p>As new tools are being developed by threat actors, a modern threat protection solution like Microsoft 365 Defender is necessary to prevent and detect the multiple techniques used in the attack chain, especially where the threat actor attempts to evade or disable specific defense mechanisms. Hunting for malicious behavior should be performed regularly in order to detect potential attacks that could evade detections, as a complementary activity for continuous monitoring from security tools alerts and incidents.<\/p>\n<p>To understand how Microsoft can help you secure your network and respond to network compromise, visit https:\/\/aka.ms\/MicrosoftIR.<\/p>\n<h2 class=\"wp-block-heading\">Microsoft 365 Defender detections<\/h2>\n<p><strong>Microsoft Defender Antivirus<\/strong><\/p>\n<p>Microsoft Defender Antivirus detects this threat as the following malware:<\/p>\n<ul>\n<li>Trojan:Win32\/Kovter!MSR<\/li>\n<li>Trojan:Win64\/WinGoObfusc.LK!MT<\/li>\n<li>Trojan:Win64\/BlackByte!MSR<\/li>\n<li>HackTool:Win32\/AdFind!MSR<\/li>\n<li>Trojan:Win64\/CobaltStrike!MSR<\/li>\n<\/ul>\n<p><strong>Microsoft Defender for Endpoint<\/strong><\/p>\n<p>The following alerts might indicate threat activity related to this threat. Note, however, that these alerts can be also triggered by unrelated threat activity.<\/p>\n<ul>\n<li>\u2018CVE-2021-31207\u2019 exploit malware was detected<\/li>\n<li>An active \u2018NetShDisableFireWall\u2019 malware in a command line was prevented from executing.<\/li>\n<li>Suspicious registry modification.<\/li>\n<li>\u2018Rtcore64\u2019 hacktool was detected<\/li>\n<li>Possible ongoing hands-on-keyboard activity (Cobalt Strike)<\/li>\n<li>A file or network connection related to a ransomware-linked emerging threat activity group detected<\/li>\n<li>Suspicious sequence of exploration activities<\/li>\n<li>A process was injected with potentially malicious code<\/li>\n<li>Suspicious behavior by cmd.exe was observed<\/li>\n<li>\u2018Blackbyte\u2019 ransomware was detected<\/li>\n<\/ul>\n<p><strong>Microsoft Defender Vulnerability Management<\/strong><\/p>\n<p>Microsoft Defender Vulnerability Management surfaces devices that may be affected by the following vulnerabilities used in this threat:<\/p>\n<ul>\n<li>CVE-2021-34473<\/li>\n<li>CVE-2021-34523<\/li>\n<li>CVE-2021-31207<\/li>\n<li>CVE-2019-16098<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Hunting queries<\/h2>\n<p><strong>Microsoft 365 Defender<\/strong><\/p>\n<p>Microsoft 365 Defender customers can run the following query to find related activity in their networks:<\/p>\n<p><strong>ProxyShell web shell creation events<\/strong><\/p>\n<div class=\"wp-block-syntaxhighlighter-code \" readability=\"10\">\n<pre class=\"brush: plain; gutter: false; title: ; notranslate\" title>\nDeviceProcessEvents\n| where ProcessCommandLine has_any (\"ExcludeDumpster\",\"New-ExchangeCertificate\") and ProcessCommandLine has_any ((\"-RequestFile\",\"-FilePath\")\n<\/pre>\n<\/div>\n<p><strong>Suspicious vssadmin events<\/strong><\/p>\n<div class=\"wp-block-syntaxhighlighter-code \" readability=\"11\">\n<pre class=\"brush: plain; gutter: false; title: ; notranslate\" title>\nDeviceProcessEvents\n| where ProcessCommandLine has_any (\"vssadmin\",\"vssadmin.exe\") and ProcessCommandLine has \"Resize ShadowStorage\" and ProcessCommandLine has_any (\"MaxSize=401MB\",\" MaxSize=UNBOUNDED\")\n<\/pre>\n<\/div>\n<p><strong>Detection for persistence creation using Registry Run keys<\/strong><\/p>\n<div class=\"wp-block-syntaxhighlighter-code \" readability=\"17\">\n<pre class=\"brush: plain; gutter: false; title: ; notranslate\" title>\nDeviceRegistryEvents | where ActionType == \"RegistryValueSet\" | where (RegistryKey has @\"Microsoft\\Windows\\CurrentVersion\\RunOnce\" and RegistryValueName == \"MsEdgeMsE\") or (RegistryKey has @\"Microsoft\\Windows\\CurrentVersion\\RunOnceEx\" and RegistryValueName == \"MsEdgeMsE\") or (RegistryKey has @\"Microsoft\\Windows\\CurrentVersion\\Run\" and RegistryValueName == \"MsEdgeMsE\")\n| where RegistryValueData startswith @\"rundll32\"\n| where RegistryValueData endswith @\".dll,Default\"\n| project Timestamp,DeviceId,DeviceName,ActionType,RegistryKey,RegistryValueName,RegistryValueData\n<\/pre>\n<\/div>\n<p><strong>Microsoft Sentinel<\/strong><\/p>\n<p>Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with \u2018TI map\u2019) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace. More details on the Content Hub can be found here:&nbsp; <a href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy\">https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy<\/a><\/p>\n<p>Microsoft Sentinel also has a range of detection and threat hunting content that customers can use to detect the post exploitation activity detailed in this blog in addition to Microsoft 365 Defender detections list above.<\/p>\n<h2 class=\"wp-block-heading\">Indicators of compromise<\/h2>\n<p>The table below shows IOCs observed during our investigation. We encourage our customers to investigate these indicators in their environments and implement detections and protections to identify past related activity and prevent future attacks against their systems.<\/p>\n<figure class=\"wp-block-table table\">\n<table class=\"has-fixed-layout\">\n<tbody readability=\"17.5\">\n<tr>\n<td>Indicator<\/td>\n<td>Type<\/td>\n<td>Description<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>4a066569113a569a6feb8f44257ac8764ee8f2011765009fdfd82fe3f4b92d3e<\/td>\n<td>SHA-256<\/td>\n<td>api-msvc.dll (Backdoor installed through RunKeys)<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>5f37b85687780c089607670040dbb3da2749b91b8adc0aa411fd6280b5fa7103<\/td>\n<td>SHA-256<\/td>\n<td>sys.exe (Cobalt Strike Beacon)<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd<\/td>\n<td>SHA-256<\/td>\n<td>rENEgOtiAtES (Vulnerable driver RtCore64.sys created by BlackByte binary)<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>ba3ec3f445683d0d0407157fda0c26fd669c0b8cc03f21770285a20b3133098f<\/td>\n<td>SHA-256<\/td>\n<td>[RANDOM_NAME].exe (UPX Packed PsExec created by BlackByte binary)<\/td>\n<\/tr>\n<tr readability=\"5\">\n<td>1b9badb1c646a19cdf101ac4f6fdd23bc61eaab8c9f925eb41848cea9fd0738e<\/td>\n<td>SHA-256<\/td>\n<td>\u201cnetscan.exe\u201d, \u201cnetapp.exe (Netscan network discovery tool)<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>f157090fd3ccd4220298c06ce8734361b724d80459592b10ac632acc624f455e<\/td>\n<td>SHA-256<\/td>\n<td>AdFind.exe (Active Directory information gathering tool)<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>hxxps:\/\/myvisit[.]alteksecurity[.]org\/t<\/td>\n<td>URL<\/td>\n<td>C2 for backdoor api-msvc.dll<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>hxxps:\/\/temp[.]sh\/szAyn\/sys.exe<\/td>\n<td>URL<\/td>\n<td>Download URL for sys.exe<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>109.206.243[.]59<\/td>\n<td>IP Address<\/td>\n<td>C2 for Cobalt Strike Beacon sys.exe<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>185.225.73[.]244<\/td>\n<td>IP Address<\/td>\n<td>Originating IP address for ProxyShell exploitation and web shell interaction<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>NOTE:<\/strong> These indicators should not be considered exhaustive for this observed activity.<\/p>\n<h2 class=\"wp-block-heading\">Appendix<\/h2>\n<p>File extensions targeted by BlackByte binary for encryption:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td>.4dd<\/td>\n<td>.4dl<\/td>\n<td>.accdb<\/td>\n<td>.accdc<\/td>\n<td>.accde<\/td>\n<td>.accdr<\/td>\n<td>.accdt<\/td>\n<td>.accft<\/td>\n<\/tr>\n<tr>\n<td>.adb<\/td>\n<td>.ade<\/td>\n<td>.adf<\/td>\n<td>.adp<\/td>\n<td>.arc<\/td>\n<td>.ora<\/td>\n<td>.alf<\/td>\n<td>.ask<\/td>\n<\/tr>\n<tr>\n<td>.btr<\/td>\n<td>.bdf<\/td>\n<td>.cat<\/td>\n<td>.cdb<\/td>\n<td>.ckp<\/td>\n<td>.cma<\/td>\n<td>.cpd<\/td>\n<td>.dacpac<\/td>\n<\/tr>\n<tr>\n<td>.dad<\/td>\n<td>.dadiagrams<\/td>\n<td>.daschema<\/td>\n<td>.db<\/td>\n<td>.db-shm<\/td>\n<td>.db-wal<\/td>\n<td>.db3<\/td>\n<td>.dbc<\/td>\n<\/tr>\n<tr>\n<td>.dbf<\/td>\n<td>.dbs<\/td>\n<td>.dbt<\/td>\n<td>.dbv<\/td>\n<td>. dbx<\/td>\n<td>. dcb<\/td>\n<td>. dct<\/td>\n<td>. dcx<\/td>\n<\/tr>\n<tr>\n<td>. ddl<\/td>\n<td>. dlis<\/td>\n<td>. dp1<\/td>\n<td>. dqy<\/td>\n<td>. dsk<\/td>\n<td>. dsn<\/td>\n<td>. dtsx<\/td>\n<td>. dxl<\/td>\n<\/tr>\n<tr>\n<td>. eco<\/td>\n<td>. ecx<\/td>\n<td>. edb<\/td>\n<td>. epim<\/td>\n<td>. exb<\/td>\n<td>. fcd<\/td>\n<td>. fdb<\/td>\n<td>. fic<\/td>\n<\/tr>\n<tr>\n<td>. fmp<\/td>\n<td>. fmp12<\/td>\n<td>. fmpsl<\/td>\n<td>. fol<\/td>\n<td>.fp3<\/td>\n<td>. fp4<\/td>\n<td>. fp5<\/td>\n<td>. fp7<\/td>\n<\/tr>\n<tr>\n<td>. fpt<\/td>\n<td>. frm<\/td>\n<td>. gdb<\/td>\n<td>. grdb<\/td>\n<td>. gwi<\/td>\n<td>. hdb<\/td>\n<td>. his<\/td>\n<td>. ib<\/td>\n<\/tr>\n<tr>\n<td>. idb<\/td>\n<td>. ihx<\/td>\n<td>. itdb<\/td>\n<td>. itw<\/td>\n<td>. jet<\/td>\n<td>. jtx<\/td>\n<td>. kdb<\/td>\n<td>. kexi<\/td>\n<\/tr>\n<tr>\n<td>. kexic<\/td>\n<td>. kexis<\/td>\n<td>. lgc<\/td>\n<td>. lwx<\/td>\n<td>. maf<\/td>\n<td>. maq<\/td>\n<td>. mar<\/td>\n<td>. masmav<\/td>\n<\/tr>\n<tr>\n<td>. mdb<\/td>\n<td>. mpd<\/td>\n<td>. mrg<\/td>\n<td>. mud<\/td>\n<td>. mwb<\/td>\n<td>. myd<\/td>\n<td>. ndf<\/td>\n<td>. nnt<\/td>\n<\/tr>\n<tr>\n<td>. nrmlib<\/td>\n<td>. ns2<\/td>\n<td>. ns3<\/td>\n<td>. ns4<\/td>\n<td>. nsf<\/td>\n<td>. nv<\/td>\n<td>. nv2<\/td>\n<td>. nwdb<\/td>\n<\/tr>\n<tr>\n<td>. nyf<\/td>\n<td>. odb<\/td>\n<td>. ogy<\/td>\n<td>. orx<\/td>\n<td>. owc<\/td>\n<td>. p96<\/td>\n<td>. p97<\/td>\n<td>. pan<\/td>\n<\/tr>\n<tr>\n<td>. pdb<\/td>\n<td>. pdm<\/td>\n<td>. pnz<\/td>\n<td>. qry<\/td>\n<td>. qvd<\/td>\n<td>. rbf<\/td>\n<td>. rctd<\/td>\n<td>. rod<\/td>\n<\/tr>\n<tr>\n<td>. rodx<\/td>\n<td>. rpd<\/td>\n<td>. rsd<\/td>\n<td>. sas7bdat<\/td>\n<td>. sbf<\/td>\n<td>. scx<\/td>\n<td>. sdb<\/td>\n<td>. sdc<\/td>\n<\/tr>\n<tr>\n<td>. sdf<\/td>\n<td>. sis<\/td>\n<td>. spg<\/td>\n<td>. sql<\/td>\n<td>. sqlite<\/td>\n<td>. sqlite3<\/td>\n<td>. sqlitedb<\/td>\n<td>. te<\/td>\n<\/tr>\n<tr>\n<td>. temx<\/td>\n<td>. tmd<\/td>\n<td>. tps<\/td>\n<td>. trc<\/td>\n<td>. trm<\/td>\n<td>. udb<\/td>\n<td>. udl<\/td>\n<td>. usr<\/td>\n<\/tr>\n<tr>\n<td>. v12<\/td>\n<td>. vis<\/td>\n<td>. vpd<\/td>\n<td>. vvv<\/td>\n<td>. wdb<\/td>\n<td>. wmdb<\/td>\n<td>. wrk<\/td>\n<td>. xdb<\/td>\n<\/tr>\n<tr>\n<td>. xld<\/td>\n<td>. xmlff<\/td>\n<td>. abcddb<\/td>\n<td>. abs<\/td>\n<td>. abx<\/td>\n<td>. accdw<\/td>\n<td>. and<\/td>\n<td>. db2<\/td>\n<\/tr>\n<tr>\n<td>. fm5<\/td>\n<td>. hjt<\/td>\n<td>. icg<\/td>\n<td>. icr<\/td>\n<td>. kdb<\/td>\n<td>. lut<\/td>\n<td>. maw<\/td>\n<td>. mdn<\/td>\n<\/tr>\n<tr>\n<td>. mdt<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Shared folders targeted for encryption (Example: <em>\\\\[IP address]\\Downloads<\/em>):<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td>Users<\/td>\n<td>Backup<\/td>\n<td>Veeam<\/td>\n<td>homes<\/td>\n<td>home<\/td>\n<\/tr>\n<tr>\n<td>media<\/td>\n<td>common<\/td>\n<td>Storage Server<\/td>\n<td>Public<\/td>\n<td>Web<\/td>\n<\/tr>\n<tr>\n<td>Images<\/td>\n<td>Downloads<\/td>\n<td>BackupData<\/td>\n<td>ActiveBackupForBusiness<\/td>\n<td>Backups<\/td>\n<\/tr>\n<tr>\n<td>NAS-DC<\/td>\n<td>DCBACKUP<\/td>\n<td>DirectorFiles<\/td>\n<td>share<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>File extensions ignored:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td>.ini<\/td>\n<td>.url<\/td>\n<td>.msilog<\/td>\n<td>.log<\/td>\n<td>.ldf<\/td>\n<td>.lock<\/td>\n<td>.theme<\/td>\n<td>.msi<\/td>\n<\/tr>\n<tr>\n<td>.sys<\/td>\n<td>.wpx<\/td>\n<td>.cpl<\/td>\n<td>.adv<\/td>\n<td>.msc<\/td>\n<td>.scr<\/td>\n<td>.key<\/td>\n<td>.ico<\/td>\n<\/tr>\n<tr>\n<td>.dll<\/td>\n<td>.hta<\/td>\n<td>.deskthemepack<\/td>\n<td>.nomedia<\/td>\n<td>.msu<\/td>\n<td>.rtp<\/td>\n<td>.msp<\/td>\n<td>.idx<\/td>\n<\/tr>\n<tr>\n<td>.ani<\/td>\n<td>.386<\/td>\n<td>.diagcfg<\/td>\n<td>.bin<\/td>\n<td>.mod<\/td>\n<td>.ics<\/td>\n<td>.com<\/td>\n<td>.hlp<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;.spl<\/td>\n<td>.nls<\/td>\n<td>.cab<\/td>\n<td>.exe<\/td>\n<td>.diagpkg<\/td>\n<td>.icl<\/td>\n<td>.ocx<\/td>\n<td>.rom<\/td>\n<\/tr>\n<tr>\n<td>.prf<\/td>\n<td>.thempack<\/td>\n<td>.msstyles<\/td>\n<td>.icns<\/td>\n<td>.mpa<\/td>\n<td>.drv<\/td>\n<td>.cur<\/td>\n<td>.diagcab<\/td>\n<\/tr>\n<tr>\n<td>.cmd<\/td>\n<td>.shs<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Folders ignored:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody readability=\"1\">\n<tr>\n<td>windows<\/td>\n<td>boot<\/td>\n<td>program files (x86)<\/td>\n<td>windows.old<\/td>\n<td>programdata<\/td>\n<\/tr>\n<tr>\n<td>intel<\/td>\n<td>bitdefender<\/td>\n<td>trend micro<\/td>\n<td>windowsapps<\/td>\n<td>appdata<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>application data<\/td>\n<td>system volume information<\/td>\n<td>perflogs<\/td>\n<td>msocache<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Files ignored:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td>bootnxt<\/td>\n<td>ntldr<\/td>\n<td>bootmgr<\/td>\n<td>thumbs.db<\/td>\n<\/tr>\n<tr>\n<td>ntuser.dat<\/td>\n<td>bootsect.bak<\/td>\n<td>autoexec.bat<\/td>\n<td>iconcache.db<\/td>\n<\/tr>\n<tr>\n<td>bootfont.bin<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Processes terminated:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td>teracopy<\/td>\n<td>teamviewer<\/td>\n<td>nsservice<\/td>\n<td>nsctrl<\/td>\n<td>uranium<\/td>\n<\/tr>\n<tr>\n<td>processhacker<\/td>\n<td>procmon<\/td>\n<td>pestudio<\/td>\n<td>procmon64<\/td>\n<td>x32dbg<\/td>\n<\/tr>\n<tr>\n<td>x64dbg<\/td>\n<td>cff explorer<\/td>\n<td>procexp<\/td>\n<td>pslist<\/td>\n<td>tcpview<\/td>\n<\/tr>\n<tr>\n<td>tcpvcon<\/td>\n<td>dbgview<\/td>\n<td>rammap<\/td>\n<td>rammap64<\/td>\n<td>vmmap<\/td>\n<\/tr>\n<tr>\n<td>ollydbg<\/td>\n<td>autoruns<\/td>\n<td>autorunssc<\/td>\n<td>filemon<\/td>\n<td>regmon<\/td>\n<\/tr>\n<tr>\n<td>idaq<\/td>\n<td>idaq64<\/td>\n<td>immunitydebugger<\/td>\n<td>wireshark<\/td>\n<td>dumpcap<\/td>\n<\/tr>\n<tr>\n<td>hookexplorer<\/td>\n<td>importrec<\/td>\n<td>petools<\/td>\n<td>lordpe<\/td>\n<td>sysinspector<\/td>\n<\/tr>\n<tr>\n<td>proc_analyzer<\/td>\n<td>sysanalyzer<\/td>\n<td>sniff_hit<\/td>\n<td>windbg<\/td>\n<td>joeboxcontrol<\/td>\n<\/tr>\n<tr>\n<td>joeboxserver<\/td>\n<td>resourcehacker<\/td>\n<td>fiddler<\/td>\n<td>httpdebugger<\/td>\n<td>dumpit<\/td>\n<\/tr>\n<tr>\n<td>rammap<\/td>\n<td>rammap64<\/td>\n<td>vmmap<\/td>\n<td>agntsvc<\/td>\n<td>cntaosmgr<\/td>\n<\/tr>\n<tr>\n<td>dbeng50<\/td>\n<td>dbsnmp<\/td>\n<td>encsvc<\/td>\n<td>infopath<\/td>\n<td>isqlplussvc<\/td>\n<\/tr>\n<tr>\n<td>mbamtray<\/td>\n<td>msaccess<\/td>\n<td>msftesql<\/td>\n<td>mspub<\/td>\n<td>mydesktopqos<\/td>\n<\/tr>\n<tr>\n<td>mydesktopservice<\/td>\n<td>mysqld<\/td>\n<td>mysqld-nt<\/td>\n<td>mysqld-opt<\/td>\n<td>Ntrtscan<\/td>\n<\/tr>\n<tr>\n<td>ocautoupds<\/td>\n<td>ocomm<\/td>\n<td>ocssd<\/td>\n<td>onenote<\/td>\n<td>oracle<\/td>\n<\/tr>\n<tr>\n<td>outlook<\/td>\n<td>PccNTMon<\/td>\n<td>powerpnt<\/td>\n<td>sqbcoreservice<\/td>\n<td>sql<\/td>\n<\/tr>\n<tr>\n<td>sqlagent<\/td>\n<td>sqlbrowser<\/td>\n<td>sqlservr<\/td>\n<td>sqlwriter<\/td>\n<td>steam<\/td>\n<\/tr>\n<tr>\n<td>synctime<\/td>\n<td>tbirdconfig<\/td>\n<td>thebat<\/td>\n<td>thebat64<\/td>\n<td>thunderbird<\/td>\n<\/tr>\n<tr>\n<td>tmlisten<\/td>\n<td>visio<\/td>\n<td>winword<\/td>\n<td>wordpad<\/td>\n<td>xfssvccon<\/td>\n<\/tr>\n<tr>\n<td>zoolz<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Services terminated:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody readability=\"2\">\n<tr>\n<td>CybereasonRansomFree<\/td>\n<td>vnetd<\/td>\n<td>bpcd<\/td>\n<td>SamSs<\/td>\n<td>TeraCopyService<\/td>\n<\/tr>\n<tr>\n<td>msftesql<\/td>\n<td>nsService<\/td>\n<td>klvssbridge64<\/td>\n<td>vapiendpoint<\/td>\n<td>ShMonitor<\/td>\n<\/tr>\n<tr>\n<td>Smcinst<\/td>\n<td>SmcService<\/td>\n<td>SntpService<\/td>\n<td>svcGenericHost<\/td>\n<td>Swi_<\/td>\n<\/tr>\n<tr>\n<td>TmCCSF<\/td>\n<td>tmlisten<\/td>\n<td>TrueKey<\/td>\n<td>TrueKeyScheduler<\/td>\n<td>TrueKeyServiceHelper<\/td>\n<\/tr>\n<tr>\n<td>WRSVC<\/td>\n<td>McTaskManager<\/td>\n<td>OracleClientCache80<\/td>\n<td>mfefire<\/td>\n<td>wbengine<\/td>\n<\/tr>\n<tr>\n<td>mfemms<\/td>\n<td>RESvc<\/td>\n<td>mfevtp<\/td>\n<td>sacsvr<\/td>\n<td>SAVAdminService<\/td>\n<\/tr>\n<tr>\n<td>SepMasterService<\/td>\n<td>PDVFSService<\/td>\n<td>ESHASRV<\/td>\n<td>SDRSVC<\/td>\n<td>FA_Scheduler<\/td>\n<\/tr>\n<tr>\n<td>KAVFS<\/td>\n<td>KAVFS_KAVFSGT<\/td>\n<td>kavfsslp<\/td>\n<td>klnagent<\/td>\n<td>macmnsvc<\/td>\n<\/tr>\n<tr>\n<td>masvc<\/td>\n<td>MBAMService<\/td>\n<td>MBEndpointAgent<\/td>\n<td>McShield<\/td>\n<td>audioendpointbuilder<\/td>\n<\/tr>\n<tr>\n<td>Antivirus<\/td>\n<td>AVP<\/td>\n<td>DCAgent<\/td>\n<td>bedbg<\/td>\n<td>EhttpSrv<\/td>\n<\/tr>\n<tr>\n<td>MMS<\/td>\n<td>ekrn<\/td>\n<td>EPSecurityService<\/td>\n<td>EPUpdateService<\/td>\n<td>ntrtscan<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>EsgShKernel<\/td>\n<td>msexchangeadtopology<\/td>\n<td>AcrSch2Svc<\/td>\n<td>MSOLAP$TPSAMA<\/td>\n<td>Intel(R) PROSet Monitoring<\/td>\n<\/tr>\n<tr>\n<td>msexchangeimap4<\/td>\n<td>ARSM<\/td>\n<td>unistoresvc_1af40a<\/td>\n<td>ReportServer$TPS<\/td>\n<td>MSOLAP$SYSTEM_BGC<\/td>\n<\/tr>\n<tr>\n<td>W3Svc<\/td>\n<td>MSExchangeSRS<\/td>\n<td>ReportServer$TPSAMA<\/td>\n<td>Zoolz 2 Service<\/td>\n<td>MSOLAP$TPS<\/td>\n<\/tr>\n<tr>\n<td>aphidmonitorservice<\/td>\n<td>SstpSvc<\/td>\n<td>MSExchangeMTA<\/td>\n<td>ReportServer$SYSTEM_BGC<\/td>\n<td>Symantec System Recovery<\/td>\n<\/tr>\n<tr>\n<td>UI0Detect<\/td>\n<td>MSExchangeSA<\/td>\n<td>MSExchangeIS<\/td>\n<td>ReportServer<\/td>\n<td>MsDtsServer110<\/td>\n<\/tr>\n<tr>\n<td>POP3Svc<\/td>\n<td>MSExchangeMGMT<\/td>\n<td>SMTPSvc<\/td>\n<td>MsDtsServer<\/td>\n<td>IisAdmin<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>MSExchangeES<\/td>\n<td>EraserSvc11710<\/td>\n<td>Enterprise Client Service<\/td>\n<td>MsDtsServer100<\/td>\n<td>NetMsmqActivator<\/td>\n<\/tr>\n<tr>\n<td>stc_raw_agent<\/td>\n<td>VSNAPVSS<\/td>\n<td>PDVFSService<\/td>\n<td>AcrSch2Svc<\/td>\n<td>Acronis<\/td>\n<\/tr>\n<tr>\n<td>CASAD2DWebSvc<\/td>\n<td>CAARCUpdateSvc<\/td>\n<td>McAfee<\/td>\n<td>avpsus<\/td>\n<td>DLPAgentService<\/td>\n<\/tr>\n<tr>\n<td>mfewc<\/td>\n<td>BMR Boot Service<\/td>\n<td>DefWatch<\/td>\n<td>ccEvtMgr<\/td>\n<td>ccSetMgr<\/td>\n<\/tr>\n<tr>\n<td>SavRoam<\/td>\n<td>RTVsc screenconnect<\/td>\n<td>ransom<\/td>\n<td>sqltelemetry<\/td>\n<td>msexch<\/td>\n<\/tr>\n<tr>\n<td>vnc<\/td>\n<td>teamviewer<\/td>\n<td>msolap<\/td>\n<td>veeam<\/td>\n<td>backup<\/td>\n<\/tr>\n<tr>\n<td>sql<\/td>\n<td>memtas<\/td>\n<td>vss<\/td>\n<td>sophos<\/td>\n<td>svc$<\/td>\n<\/tr>\n<tr>\n<td>mepocs<\/td>\n<td>wuauserv<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Drivers that Blackbyte can bypass:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody readability=\"8\">\n<tr>\n<td>360avflt.sys<\/td>\n<td>360box.sys<\/td>\n<td>360fsflt.sys<\/td>\n<td>360qpesv.sys<\/td>\n<td>5nine.cbt.sys<\/td>\n<\/tr>\n<tr>\n<td>a2acc.sys<\/td>\n<td>a2acc64.sys<\/td>\n<td>a2ertpx64.sys<\/td>\n<td>a2ertpx86.sys<\/td>\n<td>a2gffi64.sys<\/td>\n<\/tr>\n<tr>\n<td>a2gffx64.sys<\/td>\n<td>a2gffx86.sys<\/td>\n<td>aaf.sys<\/td>\n<td>aalprotect.sys<\/td>\n<td>abrpmon.sys<\/td>\n<\/tr>\n<tr readability=\"4\">\n<td>accessvalidator.sys<\/td>\n<td>acdriver.sys<\/td>\n<td>acdrv.sys<\/td>\n<td>adaptivaclientcache32.sys<\/td>\n<td>adaptivaclientcache64.sys<\/td>\n<\/tr>\n<tr>\n<td>adcvcsnt.sys<\/td>\n<td>adspiderdoc.sys<\/td>\n<td>aefilter.sys<\/td>\n<td>agentrtm64.sys<\/td>\n<td>agfsmon.sys<\/td>\n<\/tr>\n<tr>\n<td>agseclock.sys<\/td>\n<td>agsyslock.sys<\/td>\n<td>ahkamflt.sys<\/td>\n<td>ahksvpro.sys<\/td>\n<td>ahkusbfw.sys<\/td>\n<\/tr>\n<tr>\n<td>ahnrghlh.sys<\/td>\n<td>aictracedrv_am.sys<\/td>\n<td>airship-filter.sys<\/td>\n<td>ajfsprot.sys<\/td>\n<td>alcapture.sys<\/td>\n<\/tr>\n<tr>\n<td>alfaff.sys<\/td>\n<td>altcbt.sys<\/td>\n<td>amfd.sys<\/td>\n<td>amfsm.sys<\/td>\n<td>amm6460.sys<\/td>\n<\/tr>\n<tr>\n<td>amm8660.sys<\/td>\n<td>amsfilter.sys<\/td>\n<td>amznmon.sys<\/td>\n<td>antileakfilter.sys<\/td>\n<td>antispyfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>anvfsm.sys<\/td>\n<td>apexsqlfilterdriver.sys<\/td>\n<td>appcheckd.sys<\/td>\n<td>appguard.sys<\/td>\n<td>appvmon.sys<\/td>\n<\/tr>\n<tr>\n<td>arfmonnt.sys<\/td>\n<td>arta.sys<\/td>\n<td>arwflt.sys<\/td>\n<td>asgard.sys<\/td>\n<td>ashavscan.sys<\/td>\n<\/tr>\n<tr>\n<td>asiofms.sys<\/td>\n<td>aswfsblk.sys<\/td>\n<td>aswmonflt.sys<\/td>\n<td>aswsnx.sys<\/td>\n<td>aswsp.sys<\/td>\n<\/tr>\n<tr>\n<td>aszfltnt.sys<\/td>\n<td>atamptnt.sys<\/td>\n<td>atc.sys<\/td>\n<td>atdragent.sys<\/td>\n<td>atdragent64.sys<\/td>\n<\/tr>\n<tr>\n<td>aternityregistryhook.sys<\/td>\n<td>atflt.sys<\/td>\n<td>atrsdfw.sys<\/td>\n<td>auditflt.sys<\/td>\n<td>aupdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>avapsfd.sys<\/td>\n<td>avc3.sys<\/td>\n<td>avckf.sys<\/td>\n<td>avfsmn.sys<\/td>\n<td>avgmfi64.sys<\/td>\n<\/tr>\n<tr>\n<td>avgmfrs.sys<\/td>\n<td>avgmfx64.sys<\/td>\n<td>avgmfx86.sys<\/td>\n<td>avgntflt.sys<\/td>\n<td>avgtpx64.sys<\/td>\n<\/tr>\n<tr>\n<td>avgtpx86.sys<\/td>\n<td>avipbb.sys<\/td>\n<td>avkmgr.sys<\/td>\n<td>avmf.sys<\/td>\n<td>awarecore.sys<\/td>\n<\/tr>\n<tr>\n<td>axfltdrv.sys<\/td>\n<td>axfsysmon.sys<\/td>\n<td>ayfilter.sys<\/td>\n<td>b9kernel.sys<\/td>\n<td>backupreader.sys<\/td>\n<\/tr>\n<tr>\n<td>bamfltr.sys<\/td>\n<td>bapfecpt.sys<\/td>\n<td>bbfilter.sys<\/td>\n<td>bd0003.sys<\/td>\n<td>bddevflt.sys<\/td>\n<\/tr>\n<tr>\n<td>bdfiledefend.sys<\/td>\n<td>bdfilespy.sys<\/td>\n<td>bdfm.sys<\/td>\n<td>bdfsfltr.sys<\/td>\n<td>bdprivmon.sys<\/td>\n<\/tr>\n<tr>\n<td>bdrdfolder.sys<\/td>\n<td>bdsdkit.sys<\/td>\n<td>bdsfilter.sys<\/td>\n<td>bdsflt.sys<\/td>\n<td>bdsvm.sys<\/td>\n<\/tr>\n<tr>\n<td>bdsysmon.sys<\/td>\n<td>bedaisy.sys<\/td>\n<td>bemk.sys<\/td>\n<td>bfaccess.sys<\/td>\n<td>bfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>bfmon.sys<\/td>\n<td>bhdrvx64.sys<\/td>\n<td>bhdrvx86.sys<\/td>\n<td>bhkavka.sys<\/td>\n<td>bhkavki.sys<\/td>\n<\/tr>\n<tr>\n<td>bkavautoflt.sys<\/td>\n<td>bkavsdflt.sys<\/td>\n<td>blackbirdfsa.sys<\/td>\n<td>blackcat.sys<\/td>\n<td>bmfsdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>bmregdrv.sys<\/td>\n<td>boscmflt.sys<\/td>\n<td>bosfsfltr.sys<\/td>\n<td>bouncer.sys<\/td>\n<td>boxifier.sys<\/td>\n<\/tr>\n<tr>\n<td>brcow_x_x_x_x.sys<\/td>\n<td>brfilter.sys<\/td>\n<td>brnfilelock.sys<\/td>\n<td>brnseclock.sys<\/td>\n<td>browsermon.sys<\/td>\n<\/tr>\n<tr>\n<td>bsrfsflt.sys<\/td>\n<td>bssaudit.sys<\/td>\n<td>bsyaed.sys<\/td>\n<td>bsyar.sys<\/td>\n<td>bsydf.sys<\/td>\n<\/tr>\n<tr>\n<td>bsyirmf.sys<\/td>\n<td>bsyrtm.sys<\/td>\n<td>bsysp.sys<\/td>\n<td>bsywl.sys<\/td>\n<td>bwfsdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>bzsenspdrv.sys<\/td>\n<td>bzsenth.sys<\/td>\n<td>bzsenyaradrv.sys<\/td>\n<td>caadflt.sys<\/td>\n<td>caavfltr.sys<\/td>\n<\/tr>\n<tr>\n<td>cancelsafe.sys<\/td>\n<td>carbonblackk.sys<\/td>\n<td>catflt.sys<\/td>\n<td>catmf.sys<\/td>\n<td>cbelam.sys<\/td>\n<\/tr>\n<tr>\n<td>cbfilter20.sys<\/td>\n<td>cbfltfs4.sys<\/td>\n<td>cbfsfilter2017.sys<\/td>\n<td>cbfsfilter2020.sys<\/td>\n<td>cbsampledrv.sys<\/td>\n<\/tr>\n<tr>\n<td>cdo.sys<\/td>\n<td>cdrrsflt.sys<\/td>\n<td>cdsgfsfilter.sys<\/td>\n<td>centrifyfsf.sys<\/td>\n<td>cfrmd.sys<\/td>\n<\/tr>\n<tr>\n<td>cfsfdrv<\/td>\n<td>cgwmf.sys<\/td>\n<td>change.sys<\/td>\n<td>changelog.sys<\/td>\n<td>chemometecfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>ciscoampcefwdriver.sys<\/td>\n<td>ciscoampheurdriver.sys<\/td>\n<td>ciscosam.sys<\/td>\n<td>clumiochangeblockmf.sys<\/td>\n<td>cmdccav.sys<\/td>\n<\/tr>\n<tr>\n<td>cmdcwagt.sys<\/td>\n<td>cmdguard.sys<\/td>\n<td>cmdmnefs.sys<\/td>\n<td>cmflt.sys<\/td>\n<td>code42filter.sys<\/td>\n<\/tr>\n<tr>\n<td>codex.sys<\/td>\n<td>conduantfsfltr.sys<\/td>\n<td>containermonitor.sys<\/td>\n<td>cpavfilter.sys<\/td>\n<td>cpavkernel.sys<\/td>\n<\/tr>\n<tr>\n<td>cpepmon.sys<\/td>\n<td>crexecprev.sys<\/td>\n<td>crncache32.sys<\/td>\n<td>crncache64.sys<\/td>\n<td>crnsysm.sys<\/td>\n<\/tr>\n<tr>\n<td>cruncopy.sys<\/td>\n<td>csaam.sys<\/td>\n<td>csaav.sys<\/td>\n<td>csacentr.sys<\/td>\n<td>csaenh.sys<\/td>\n<\/tr>\n<tr>\n<td>csagent.sys<\/td>\n<td>csareg.sys<\/td>\n<td>csascr.sys<\/td>\n<td>csbfilter.sys<\/td>\n<td>csdevicecontrol.sys<\/td>\n<\/tr>\n<tr>\n<td>csfirmwareanalysis.sys<\/td>\n<td>csflt.sys<\/td>\n<td>csmon.sys<\/td>\n<td>cssdlp.sys<\/td>\n<td>ctamflt.sys<\/td>\n<\/tr>\n<tr>\n<td>ctifile.sys<\/td>\n<td>ctinet.sys<\/td>\n<td>ctrpamon.sys<\/td>\n<td>ctx.sys<\/td>\n<td>cvcbt.sys<\/td>\n<\/tr>\n<tr>\n<td>cvofflineflt32.sys<\/td>\n<td>cvofflineflt64.sys<\/td>\n<td>cvsflt.sys<\/td>\n<td>cwdriver.sys<\/td>\n<td>cwmem2k64.sys<\/td>\n<\/tr>\n<tr>\n<td>cybkerneltracker.sys<\/td>\n<td>cylancedrv64.sys<\/td>\n<td>cyoptics.sys<\/td>\n<td>cyprotectdrv32.sys<\/td>\n<td>cyprotectdrv64.sys<\/td>\n<\/tr>\n<tr>\n<td>cytmon.sys<\/td>\n<td>cyverak.sys<\/td>\n<td>cyvrfsfd.sys<\/td>\n<td>cyvrlpc.sys<\/td>\n<td>cyvrmtgn.sys<\/td>\n<\/tr>\n<tr>\n<td>datanow_driver.sys<\/td>\n<td>dattofsf.sys<\/td>\n<td>da_ctl.sys<\/td>\n<td>dcfafilter.sys<\/td>\n<td>dcfsgrd.sys<\/td>\n<\/tr>\n<tr>\n<td>dcsnaprestore.sys<\/td>\n<td>deepinsfs.sys<\/td>\n<td>delete_flt.sys<\/td>\n<td>devmonminifilter.sys<\/td>\n<td>dfmfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>dgedriver.sys<\/td>\n<td>dgfilter.sys<\/td>\n<td>dgsafe.sys<\/td>\n<td>dhwatchdog.sys<\/td>\n<td>diflt.sys<\/td>\n<\/tr>\n<tr>\n<td>diskactmon.sys<\/td>\n<td>dkdrv.sys<\/td>\n<td>dkrtwrt.sys<\/td>\n<td>dktlfsmf.sys<\/td>\n<td>dnafsmonitor.sys<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>docvmonk.sys<\/td>\n<td>docvmonk64.sys<\/td>\n<td>dpmfilter.sys<\/td>\n<td>drbdlock.sys<\/td>\n<td>drivesentryfilterdriver2lite.sys<\/td>\n<\/tr>\n<tr>\n<td>drsfile.sys<\/td>\n<td>drvhookcsmf.sys<\/td>\n<td>drvhookcsmf_amd64.sys<\/td>\n<td>drwebfwflt.sys<\/td>\n<td>drwebfwft.sys<\/td>\n<\/tr>\n<tr>\n<td>dsark.sys<\/td>\n<td>dsdriver.sys<\/td>\n<td>dsfemon.sys<\/td>\n<td>dsflt.sys<\/td>\n<td>dsfltfs.sys<\/td>\n<\/tr>\n<tr>\n<td>dskmn.sys<\/td>\n<td>dtdsel.sys<\/td>\n<td>dtpl.sys<\/td>\n<td>dwprot.sys<\/td>\n<td>dwshield.sys<\/td>\n<\/tr>\n<tr>\n<td>dwshield64.sys<\/td>\n<td>eamonm.sys<\/td>\n<td>easeflt.sys<\/td>\n<td>easyanticheat.sys<\/td>\n<td>eaw.sys<\/td>\n<\/tr>\n<tr>\n<td>ecatdriver.sys<\/td>\n<td>edevmon.sys<\/td>\n<td>ednemfsfilter.sys<\/td>\n<td>edrdrv.sys<\/td>\n<td>edrsensor.sys<\/td>\n<\/tr>\n<tr>\n<td>edsigk.sys<\/td>\n<td>eectrl.sys<\/td>\n<td>eetd32.sys<\/td>\n<td>eetd64.sys<\/td>\n<td>eeyehv.sys<\/td>\n<\/tr>\n<tr>\n<td>eeyehv64.sys<\/td>\n<td>egambit.sys<\/td>\n<td>egfilterk.sys<\/td>\n<td>egminflt.sys<\/td>\n<td>egnfsflt.sys<\/td>\n<\/tr>\n<tr>\n<td>ehdrv.sys<\/td>\n<td>elock2fsctldriver.sys<\/td>\n<td>emxdrv2.sys<\/td>\n<td>enigmafilemondriver.sys<\/td>\n<td>enmon.sys<\/td>\n<\/tr>\n<tr>\n<td>epdrv.sys<\/td>\n<td>epfw.sys<\/td>\n<td>epfwwfp.sys<\/td>\n<td>epicfilter.sys<\/td>\n<td>epklib.sys<\/td>\n<\/tr>\n<tr>\n<td>epp64.sys<\/td>\n<td>epregflt.sys<\/td>\n<td>eps.sys<\/td>\n<td>epsmn.sys<\/td>\n<td>equ8_helper.sys<\/td>\n<\/tr>\n<tr>\n<td>eraser.sys<\/td>\n<td>esensor.sys<\/td>\n<td>esprobe.sys<\/td>\n<td>estprmon.sys<\/td>\n<td>estprp.sys<\/td>\n<\/tr>\n<tr>\n<td>estregmon.sys<\/td>\n<td>estregp.sys<\/td>\n<td>estrkmon.sys<\/td>\n<td>estrkr.sys<\/td>\n<td>eventmon.sys<\/td>\n<\/tr>\n<tr>\n<td>evmf.sys<\/td>\n<td>evscase.sys<\/td>\n<td>excfs.sys<\/td>\n<td>exprevdriver.sys<\/td>\n<td>failattach.sys<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>failmount.sys<\/td>\n<td>fam.sys<\/td>\n<td>fangcloud_autolock_driver.sys<\/td>\n<td>fapmonitor.sys<\/td>\n<td>farflt.sys<\/td>\n<\/tr>\n<tr>\n<td>farwflt.sys<\/td>\n<td>fasdriver<\/td>\n<td>fcnotify.sys<\/td>\n<td>fcontrol.sys<\/td>\n<td>fdrtrace.sys<\/td>\n<\/tr>\n<tr>\n<td>fekern.sys<\/td>\n<td>fencry.sys<\/td>\n<td>ffcfilt.sys<\/td>\n<td>ffdriver.sys<\/td>\n<td>fildds.sys<\/td>\n<\/tr>\n<tr>\n<td>filefilter.sys<\/td>\n<td>fileflt.sys<\/td>\n<td>fileguard.sys<\/td>\n<td>filehubagent.sys<\/td>\n<td>filemon.sys<\/td>\n<\/tr>\n<tr>\n<td>filemonitor.sys<\/td>\n<td>filenamevalidator.sys<\/td>\n<td>filescan.sys<\/td>\n<td>filesharemon.sys<\/td>\n<td>filesightmf.sys<\/td>\n<\/tr>\n<tr>\n<td>filesystemcbt.sys<\/td>\n<td>filetrace.sys<\/td>\n<td>file_monitor.sys<\/td>\n<td>file_protector.sys<\/td>\n<td>file_tracker.sys<\/td>\n<\/tr>\n<tr>\n<td>filrdriver.sys<\/td>\n<td>fim.sys<\/td>\n<td>fiometer.sys<\/td>\n<td>fiopolicyfilter.sys<\/td>\n<td>fjgsdis2.sys<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>fjseparettifilterredirect.sys<\/td>\n<td>flashaccelfs.sys<\/td>\n<td>flightrecorder.sys<\/td>\n<td>fltrs329.sys<\/td>\n<td>flyfs.sys<\/td>\n<\/tr>\n<tr>\n<td>fmdrive.sys<\/td>\n<td>fmkkc.sys<\/td>\n<td>fmm.sys<\/td>\n<td>fortiaptfilter.sys<\/td>\n<td>fortimon2.sys<\/td>\n<\/tr>\n<tr>\n<td>fortirmon.sys<\/td>\n<td>fortishield.sys<\/td>\n<td>fpav_rtp.sys<\/td>\n<td>fpepflt.sys<\/td>\n<td>fsafilter.sys<\/td>\n<\/tr>\n<tr>\n<td>fsatp.sys<\/td>\n<td>fsfilter.sys<\/td>\n<td>fsgk.sys<\/td>\n<td>fshs.sys<\/td>\n<td>fsmon.sys<\/td>\n<\/tr>\n<tr>\n<td>fsmonitor.sys<\/td>\n<td>fsnk.sys<\/td>\n<td>fsrfilter.sys<\/td>\n<td>fstrace.sys<\/td>\n<td>fsulgk.sys<\/td>\n<\/tr>\n<tr>\n<td>fsw31rj1.sys<\/td>\n<td>gagsecurity.sys<\/td>\n<td>gbpkm.sys<\/td>\n<td>gcffilter.sys<\/td>\n<td>gddcv.sys<\/td>\n<\/tr>\n<tr>\n<td>gefcmp.sys<\/td>\n<td>gemma.sys<\/td>\n<td>geprotection.sys<\/td>\n<td>ggc.sys<\/td>\n<td>gibepcore.sys<\/td>\n<\/tr>\n<tr>\n<td>gkff.sys<\/td>\n<td>gkff64.sys<\/td>\n<td>gkpfcb.sys<\/td>\n<td>gkpfcb64.sys<\/td>\n<td>gofsmf.sys<\/td>\n<\/tr>\n<tr>\n<td>gpminifilter.sys<\/td>\n<td>groundling32.sys<\/td>\n<td>groundling64.sys<\/td>\n<td>gtkdrv.sys<\/td>\n<td>gumhfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>gzflt.sys<\/td>\n<td>hafsnk.sys<\/td>\n<td>hbflt.sys<\/td>\n<td>hbfsfltr.sys<\/td>\n<td>hcp_kernel_acq.sys<\/td>\n<\/tr>\n<tr>\n<td>hdcorrelatefdrv.sys<\/td>\n<td>hdfilemon.sys<\/td>\n<td>hdransomoffdrv.sys<\/td>\n<td>hdrfs.sys<\/td>\n<td>heimdall.sys<\/td>\n<\/tr>\n<tr>\n<td>hexisfsmonitor.sys<\/td>\n<td>hfileflt.sys<\/td>\n<td>hiofs.sys<\/td>\n<td>hmpalert.sys<\/td>\n<td>hookcentre.sys<\/td>\n<\/tr>\n<tr>\n<td>hooksys.sys<\/td>\n<td>hpreg.sys<\/td>\n<td>hsmltmon.sys<\/td>\n<td>hsmltwhl.sys<\/td>\n<td>hssfwhl.sys<\/td>\n<\/tr>\n<tr>\n<td>hvlminifilter.sys<\/td>\n<td>ibr2fsk.sys<\/td>\n<td>iccfileioad.sys<\/td>\n<td>iccfilteraudit.sys<\/td>\n<td>iccfiltersc.sys<\/td>\n<\/tr>\n<tr>\n<td>icfclientflt.sys<\/td>\n<td>icrlmonitor.sys<\/td>\n<td>iderafilterdriver.sys<\/td>\n<td>ielcp.sys<\/td>\n<td>ieslp.sys<\/td>\n<\/tr>\n<tr>\n<td>ifs64.sys<\/td>\n<td>ignis.sys<\/td>\n<td>iguard.sys<\/td>\n<td>iiscache.sys<\/td>\n<td>ikfilesec.sys<\/td>\n<\/tr>\n<tr>\n<td>im.sys<\/td>\n<td>imffilter.sys<\/td>\n<td>imfilter.sys<\/td>\n<td>imgguard.sys<\/td>\n<td>immflex.sys<\/td>\n<\/tr>\n<tr>\n<td>immunetprotect.sys<\/td>\n<td>immunetselfprotect.sys<\/td>\n<td>inisbdrv64.sys<\/td>\n<td>ino_fltr.sys<\/td>\n<td>intelcas.sys<\/td>\n<\/tr>\n<tr>\n<td>intmfs.sys<\/td>\n<td>inuse.sys<\/td>\n<td>invprotectdrv.sys<\/td>\n<td>invprotectdrv64.sys<\/td>\n<td>ionmonwdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>iothorfs.sys<\/td>\n<td>ipcomfltr.sys<\/td>\n<td>ipfilter.sys<\/td>\n<td>iprotect.sys<\/td>\n<td>iridiumswitch.sys<\/td>\n<\/tr>\n<tr>\n<td>irongatefd.sys<\/td>\n<td>isafekrnl.sys<\/td>\n<td>isafekrnlmon.sys<\/td>\n<td>isafermon<\/td>\n<td>isecureflt.sys<\/td>\n<\/tr>\n<tr>\n<td>isedrv.sys<\/td>\n<td>isfpdrv.sys<\/td>\n<td>isirmfmon.sys<\/td>\n<td>isregflt.sys<\/td>\n<td>isregflt64.sys<\/td>\n<\/tr>\n<tr>\n<td>issfltr.sys<\/td>\n<td>issregistry.sys<\/td>\n<td>it2drv.sys<\/td>\n<td>it2reg.sys<\/td>\n<td>ivappmon.sys<\/td>\n<\/tr>\n<tr>\n<td>iwdmfs.sys<\/td>\n<td>iwhlp.sys<\/td>\n<td>iwhlp2.sys<\/td>\n<td>iwhlpxp.sys<\/td>\n<td>jdppsf.sys<\/td>\n<\/tr>\n<tr>\n<td>jdppwf.sys<\/td>\n<td>jkppob.sys<\/td>\n<td>jkppok.sys<\/td>\n<td>jkpppf.sys<\/td>\n<td>jkppxk.sys<\/td>\n<\/tr>\n<tr>\n<td>k7sentry.sys<\/td>\n<td>kavnsi.sys<\/td>\n<td>kawachfsminifilter.sys<\/td>\n<td>kc3.sys<\/td>\n<td>kconv.sys<\/td>\n<\/tr>\n<tr>\n<td>kernelagent32.sys<\/td>\n<td>kewf.sys<\/td>\n<td>kfac.sys<\/td>\n<td>kfileflt.sys<\/td>\n<td>kisknl.sys<\/td>\n<\/tr>\n<tr>\n<td>klam.sys<\/td>\n<td>klbg.sys<\/td>\n<td>klboot.sys<\/td>\n<td>kldback.sys<\/td>\n<td>kldlinf.sys<\/td>\n<\/tr>\n<tr>\n<td>kldtool.sys<\/td>\n<td>klfdefsf.sys<\/td>\n<td>klflt.sys<\/td>\n<td>klgse.sys<\/td>\n<td>klhk.sys<\/td>\n<\/tr>\n<tr>\n<td>klif.sys<\/td>\n<td>klifaa.sys<\/td>\n<td>klifks.sys<\/td>\n<td>klifsm.sys<\/td>\n<td>klrsps.sys<\/td>\n<\/tr>\n<tr>\n<td>klsnsr.sys<\/td>\n<td>klupd_klif_arkmon.sys<\/td>\n<td>kmkuflt.sys<\/td>\n<td>kmnwch.sys<\/td>\n<td>kmxagent.sys<\/td>\n<\/tr>\n<tr>\n<td>kmxfile.sys<\/td>\n<td>kmxsbx.sys<\/td>\n<td>ksfsflt.sys<\/td>\n<td>ktfsfilter.sys<\/td>\n<td>ktsyncfsflt.sys<\/td>\n<\/tr>\n<tr>\n<td>kubwksp.sys<\/td>\n<td>lafs.sys<\/td>\n<td>lbd.sys<\/td>\n<td>lbprotect.sys<\/td>\n<td>lcgadmon.sys<\/td>\n<\/tr>\n<tr>\n<td>lcgfile.sys<\/td>\n<td>lcgfilemon.sys<\/td>\n<td>lcmadmon.sys<\/td>\n<td>lcmfile.sys<\/td>\n<td>lcmfilemon.sys<\/td>\n<\/tr>\n<tr>\n<td>lcmprintmon.sys<\/td>\n<td>ldsecdrv.sys<\/td>\n<td>libwamf.sys<\/td>\n<td>livedrivefilter.sys<\/td>\n<td>llfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>lmdriver.sys<\/td>\n<td>lnvscenter.sys<\/td>\n<td>locksmith.sys<\/td>\n<td>lragentmf.sys<\/td>\n<td>lrtp.sys<\/td>\n<\/tr>\n<tr>\n<td>magicbackupmonitor.sys<\/td>\n<td>magicprotect.sys<\/td>\n<td>majoradvapi.sys<\/td>\n<td>marspy.sys<\/td>\n<td>maxcryptmon.sys<\/td>\n<\/tr>\n<tr>\n<td>maxproc64.sys<\/td>\n<td>maxprotector.sys<\/td>\n<td>mbae64.sys<\/td>\n<td>mbam.sys<\/td>\n<td>mbamchameleon.sys<\/td>\n<\/tr>\n<tr>\n<td>mbamshuriken.sys<\/td>\n<td>mbamswissarmy.sys<\/td>\n<td>mbamwatchdog.sys<\/td>\n<td>mblmon.sys<\/td>\n<td>mcfilemon32.sys<\/td>\n<\/tr>\n<tr>\n<td>mcfilemon64.sys<\/td>\n<td>mcstrg.sys<\/td>\n<td>mearwfltdriver.sys<\/td>\n<td>message.sys<\/td>\n<td>mfdriver.sys<\/td>\n<\/tr>\n<tr>\n<td>mfeaack.sys<\/td>\n<td>mfeaskm.sys<\/td>\n<td>mfeavfk.sys<\/td>\n<td>mfeclnrk.sys<\/td>\n<td>mfeelamk.sys<\/td>\n<\/tr>\n<tr>\n<td>mfefirek.sys<\/td>\n<td>mfehidk.sys<\/td>\n<td>mfencbdc.sys<\/td>\n<td>mfencfilter.sys<\/td>\n<td>mfencoas.sys<\/td>\n<\/tr>\n<tr>\n<td>mfencrk.sys<\/td>\n<td>mfeplk.sys<\/td>\n<td>mfewfpk.sys<\/td>\n<td>miniicpt.sys<\/td>\n<td>minispy.sys<\/td>\n<\/tr>\n<tr>\n<td>minitrc.sys<\/td>\n<td>mlsaff.sys<\/td>\n<td>mmpsy32.sys<\/td>\n<td>mmpsy64.sys<\/td>\n<td>monsterk.sys<\/td>\n<\/tr>\n<tr>\n<td>mozycorpfilter.sys<\/td>\n<td>mozyenterprisefilter.sys<\/td>\n<td>mozyentfilter.sys<\/td>\n<td>mozyhomefilter.sys<\/td>\n<td>mozynextfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>mozyoemfilter.sys<\/td>\n<td>mozyprofilter.sys<\/td>\n<td>mpfilter.sys<\/td>\n<td>mpkernel.sys<\/td>\n<td>mpksldrv.sys<\/td>\n<\/tr>\n<tr>\n<td>mpxmon.sys<\/td>\n<td>mracdrv.sys<\/td>\n<td>mrxgoogle.sys<\/td>\n<td>mscan-rt.sys<\/td>\n<td>msiodrv4.sys<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>msixpackagingtoolmonitor.sys<\/td>\n<td>msnfsflt.sys<\/td>\n<td>mspy.sys<\/td>\n<td>mssecflt.sys<\/td>\n<td>mtsvcdf.sys<\/td>\n<\/tr>\n<tr>\n<td>mumdi.sys<\/td>\n<td>mwac.sys<\/td>\n<td>mwatcher.sys<\/td>\n<td>mwfsmfltr.sys<\/td>\n<td>mydlpmf.sys<\/td>\n<\/tr>\n<tr>\n<td>namechanger.sys<\/td>\n<td>nanoavmf.sys<\/td>\n<td>naswsp.sys<\/td>\n<td>ndgdmk.sys<\/td>\n<td>neokerbyfilter<\/td>\n<\/tr>\n<tr>\n<td>netaccctrl.sys<\/td>\n<td>netaccctrl64.sys<\/td>\n<td>netguard.sys<\/td>\n<td>netpeeker.sys<\/td>\n<td>ngscan.sys<\/td>\n<\/tr>\n<tr>\n<td>nlcbhelpi64.sys<\/td>\n<td>nlcbhelpx64.sys<\/td>\n<td>nlcbhelpx86.sys<\/td>\n<td>nlxff.sys<\/td>\n<td>nmlhssrv01.sys<\/td>\n<\/tr>\n<tr>\n<td>nmpfilter.sys<\/td>\n<td>nntinfo.sys<\/td>\n<td>novashield.sys<\/td>\n<td>nowonmf.sys<\/td>\n<td>npetw.sys<\/td>\n<\/tr>\n<tr>\n<td>nprosec.sys<\/td>\n<td>npxgd.sys<\/td>\n<td>npxgd64.sys<\/td>\n<td>nravwka.sys<\/td>\n<td>nrcomgrdka.sys<\/td>\n<\/tr>\n<tr>\n<td>nrcomgrdki.sys<\/td>\n<td>nregsec.sys<\/td>\n<td>nrpmonka.sys<\/td>\n<td>nrpmonki.sys<\/td>\n<td>nsminflt.sys<\/td>\n<\/tr>\n<tr>\n<td>nsminflt64.sys<\/td>\n<td>ntest.sys<\/td>\n<td>ntfsf.sys<\/td>\n<td>ntguard.sys<\/td>\n<td>ntps_fa.sys<\/td>\n<\/tr>\n<tr>\n<td>nullfilter.sys<\/td>\n<td>nvcmflt.sys<\/td>\n<td>nvmon.sys<\/td>\n<td>nwedriver.sys<\/td>\n<td>nxfsmon.sys<\/td>\n<\/tr>\n<tr>\n<td>nxrmflt.sys<\/td>\n<td>oadevice.sys<\/td>\n<td>oavfm.sys<\/td>\n<td>oczminifilter.sys<\/td>\n<td>odfsfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>odfsfimfilter.sys<\/td>\n<td>odfstokenfilter.sys<\/td>\n<td>offsm.sys<\/td>\n<td>omfltlh.sys<\/td>\n<td>osiris.sys<\/td>\n<\/tr>\n<tr>\n<td>ospfile_mini.sys<\/td>\n<td>ospmon.sys<\/td>\n<td>parity.sys<\/td>\n<td>passthrough.sys<\/td>\n<td>path8flt.sys<\/td>\n<\/tr>\n<tr>\n<td>pavdrv.sys<\/td>\n<td>pcpifd.sys<\/td>\n<td>pctcore.sys<\/td>\n<td>pctcore64.sys<\/td>\n<td>pdgenfam.sys<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>pecfilter.sys<\/td>\n<td>perfectworldanticheatsys.sys<\/td>\n<td>pervac.sys<\/td>\n<td>pfkrnl.sys<\/td>\n<td>pfracdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>pgpfs.sys<\/td>\n<td>pgpwdefs.sys<\/td>\n<td>phantomd.sys<\/td>\n<td>phdcbtdrv.sys<\/td>\n<td>pkgfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>pkticpt.sys<\/td>\n<td>plgfltr.sys<\/td>\n<td>plpoffdrv.sys<\/td>\n<td>pointguardvista64f.sys<\/td>\n<td>pointguardvistaf.sys<\/td>\n<\/tr>\n<tr>\n<td>pointguardvistar32.sys<\/td>\n<td>pointguardvistar64.sys<\/td>\n<td>procmon11.sys<\/td>\n<td>proggerdriver.sys<\/td>\n<td>psacfileaccessfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>pscff.sys<\/td>\n<td>psgdflt.sys<\/td>\n<td>psgfoctrl.sys<\/td>\n<td>psinfile.sys<\/td>\n<td>psinproc.sys<\/td>\n<\/tr>\n<tr>\n<td>psisolator.sys<\/td>\n<td>pwipf6.sys<\/td>\n<td>pwprotect.sys<\/td>\n<td>pzdrvxp.sys<\/td>\n<td>qdocumentref.sys<\/td>\n<\/tr>\n<tr>\n<td>qfapflt.sys<\/td>\n<td>qfilter.sys<\/td>\n<td>qfimdvr.sys<\/td>\n<td>qfmon.sys<\/td>\n<td>qminspec.sys<\/td>\n<\/tr>\n<tr>\n<td>qmon.sys<\/td>\n<td>qqprotect.sys<\/td>\n<td>qqprotectx64.sys<\/td>\n<td>qqsysmon.sys<\/td>\n<td>qqsysmonx64.sys<\/td>\n<\/tr>\n<tr>\n<td>qutmdrv.sys<\/td>\n<td>ranpodfs.sys<\/td>\n<td>ransomdefensexxx.sys<\/td>\n<td>ransomdetect.sys<\/td>\n<td>reaqtor.sys<\/td>\n<\/tr>\n<tr>\n<td>redlight.sys<\/td>\n<td>regguard.sys<\/td>\n<td>reghook.sys<\/td>\n<td>regmonex.sys<\/td>\n<td>repdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>repmon.sys<\/td>\n<td>revefltmgr.sys<\/td>\n<td>reveprocprotection.sys<\/td>\n<td>revonetdriver.sys<\/td>\n<td>rflog.sys<\/td>\n<\/tr>\n<tr>\n<td>rgnt.sys<\/td>\n<td>rmdiskmon.sys<\/td>\n<td>rmphvmonitor.sys<\/td>\n<td>rpwatcher.sys<\/td>\n<td>rrmon32.sys<\/td>\n<\/tr>\n<tr>\n<td>rrmon64.sys<\/td>\n<td>rsfdrv.sys<\/td>\n<td>rsflt.sys<\/td>\n<td>rspcrtw.sys<\/td>\n<td>rsrtw.sys<\/td>\n<\/tr>\n<tr>\n<td>rswctrl.sys<\/td>\n<td>rswmon.sys<\/td>\n<td>rtologon.sys<\/td>\n<td>rtw.sys<\/td>\n<td>ruaff.sys<\/td>\n<\/tr>\n<tr>\n<td>rubrikfileaudit.sys<\/td>\n<td>ruidiskfs.sys<\/td>\n<td>ruieye.sys<\/td>\n<td>ruifileaccess.sys<\/td>\n<td>ruimachine.sys<\/td>\n<\/tr>\n<tr>\n<td>ruiminispy.sys<\/td>\n<td>rvsavd.sys<\/td>\n<td>rvsmon.sys<\/td>\n<td>rw7fsflt.sys<\/td>\n<td>rwchangedrv.sys<\/td>\n<\/tr>\n<tr>\n<td>ryfilter.sys<\/td>\n<td>ryguard.sys<\/td>\n<td>safe-agent.sys<\/td>\n<td>safsfilter.sys<\/td>\n<td>sagntflt.sys<\/td>\n<\/tr>\n<tr>\n<td>sahara.sys<\/td>\n<td>sakfile.sys<\/td>\n<td>sakmfile.sys<\/td>\n<td>samflt.sys<\/td>\n<td>samsungrapidfsfltr.sys<\/td>\n<\/tr>\n<tr>\n<td>sanddriver.sys<\/td>\n<td>santa.sys<\/td>\n<td>sascan.sys<\/td>\n<td>savant.sys<\/td>\n<td>savonaccess.sys<\/td>\n<\/tr>\n<tr>\n<td>scaegis.sys<\/td>\n<td>scauthfsflt.sys<\/td>\n<td>scauthiodrv.sys<\/td>\n<td>scensemon.sys<\/td>\n<td>scfltr.sys<\/td>\n<\/tr>\n<tr>\n<td>scifsflt.sys<\/td>\n<td>sciptflt.sys<\/td>\n<td>sconnect.sys<\/td>\n<td>scred.sys<\/td>\n<td>sdactmon.sys<\/td>\n<\/tr>\n<tr>\n<td>sddrvldr.sys<\/td>\n<td>sdvfilter.sys<\/td>\n<td>se46filter.sys<\/td>\n<td>secdodriver.sys<\/td>\n<td>secone_filemon10.sys<\/td>\n<\/tr>\n<tr>\n<td>secone_proc10.sys<\/td>\n<td>secone_reg10.sys<\/td>\n<td>secone_usb.sys<\/td>\n<td>secrmm.sys<\/td>\n<td>secufile.sys<\/td>\n<\/tr>\n<tr>\n<td>secure_os.sys<\/td>\n<td>secure_os_mf.sys<\/td>\n<td>securofsd_x64.sys<\/td>\n<td>sefo.sys<\/td>\n<td>segf.sys<\/td>\n<\/tr>\n<tr>\n<td>segiraflt.sys<\/td>\n<td>segmd.sys<\/td>\n<td>segmp.sys<\/td>\n<td>sentinelmonitor.sys<\/td>\n<td>serdr.sys<\/td>\n<\/tr>\n<tr>\n<td>serfs.sys<\/td>\n<td>sfac.sys<\/td>\n<td>sfavflt.sys<\/td>\n<td>sfdfilter.sys<\/td>\n<td>sfpmonitor.sys<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>sgresflt.sys<\/td>\n<td>shdlpmedia.sys<\/td>\n<td>shdlpsf.sys<\/td>\n<td>sheedantivirusfilterdriver.sys<\/td>\n<td>sheedselfprotection.sys<\/td>\n<\/tr>\n<tr>\n<td>shldflt.sys<\/td>\n<td>si32_file.sys<\/td>\n<td>si64_file.sys<\/td>\n<td>sieflt.sys<\/td>\n<td>simrep.sys<\/td>\n<\/tr>\n<tr>\n<td>sisipsfilefilter<\/td>\n<td>sk.sys<\/td>\n<td>skyamdrv.sys<\/td>\n<td>skyrgdrv.sys<\/td>\n<td>skywpdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>slb_guard.sys<\/td>\n<td>sld.sys<\/td>\n<td>smbresilfilter.sys<\/td>\n<td>smdrvnt.sys<\/td>\n<td>sndacs.sys<\/td>\n<\/tr>\n<tr>\n<td>snexequota.sys<\/td>\n<td>snilog.sys<\/td>\n<td>snimg.sys<\/td>\n<td>snscore.sys<\/td>\n<td>snsrflt.sys<\/td>\n<\/tr>\n<tr>\n<td>sodatpfl.sys<\/td>\n<td>softfilterxxx.sys<\/td>\n<td>soidriver.sys<\/td>\n<td>solitkm.sys<\/td>\n<td>sonar.sys<\/td>\n<\/tr>\n<tr>\n<td>sophosdt2.sys<\/td>\n<td>sophosed.sys<\/td>\n<td>sophosntplwf.sys<\/td>\n<td>sophossupport.sys<\/td>\n<td>spbbcdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>spellmon.sys<\/td>\n<td>spider3g.sys<\/td>\n<td>spiderg3.sys<\/td>\n<td>spiminifilter.sys<\/td>\n<td>spotlight.sys<\/td>\n<\/tr>\n<tr>\n<td>sprtdrv.sys<\/td>\n<td>sqlsafefilterdriver.sys<\/td>\n<td>srminifilterdrv.sys<\/td>\n<td>srtsp.sys<\/td>\n<td>srtsp64.sys<\/td>\n<\/tr>\n<tr>\n<td>srtspit.sys<\/td>\n<td>ssfmonm.sys<\/td>\n<td>ssrfsf.sys<\/td>\n<td>ssvhook.sys<\/td>\n<td>stcvsm.sys<\/td>\n<\/tr>\n<tr>\n<td>stegoprotect.sys<\/td>\n<td>stest.sys<\/td>\n<td>stflt.sys<\/td>\n<td>stkrnl64.sys<\/td>\n<td>storagedrv.sys<\/td>\n<\/tr>\n<tr>\n<td>strapvista.sys<\/td>\n<td>strapvista64.sys<\/td>\n<td>svcbt.sys<\/td>\n<td>swcommfltr.sys<\/td>\n<td>swfsfltr.sys<\/td>\n<\/tr>\n<tr>\n<td>swfsfltrv2.sys<\/td>\n<td>swin.sys<\/td>\n<td>symafr.sys<\/td>\n<td>symefa.sys<\/td>\n<td>symefa64.sys<\/td>\n<\/tr>\n<tr>\n<td>symefasi.sys<\/td>\n<td>symevent.sys<\/td>\n<td>symevent64x86.sys<\/td>\n<td>symevnt.sys<\/td>\n<td>symevnt32.sys<\/td>\n<\/tr>\n<tr>\n<td>symhsm.sys<\/td>\n<td>symrg.sys<\/td>\n<td>sysdiag.sys<\/td>\n<td>sysmon.sys<\/td>\n<td>sysmondrv.sys<\/td>\n<\/tr>\n<tr>\n<td>sysplant.sys<\/td>\n<td>szardrv.sys<\/td>\n<td>szdfmdrv.sys<\/td>\n<td>szdfmdrv_usb.sys<\/td>\n<td>szedrdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>szpcmdrv.sys<\/td>\n<td>taniumrecorderdrv.sys<\/td>\n<td>taobserveflt.sys<\/td>\n<td>tbfsfilt.sys<\/td>\n<td>tbmninifilter.sys<\/td>\n<\/tr>\n<tr>\n<td>tbrdrv.sys<\/td>\n<td>tdevflt.sys<\/td>\n<td>tedrdrv.sys<\/td>\n<td>tenrsafe2.sys<\/td>\n<td>tesmon.sys<\/td>\n<\/tr>\n<tr>\n<td>tesxnginx.sys<\/td>\n<td>tesxporter.sys<\/td>\n<td>tffregnt.sys<\/td>\n<td>tfsflt.sys<\/td>\n<td>tgfsmf.sys<\/td>\n<\/tr>\n<tr>\n<td>thetta.sys<\/td>\n<td>thfilter.sys<\/td>\n<td>threatstackfim.sys<\/td>\n<td>tkdac2k.sys<\/td>\n<td>tkdacxp.sys<\/td>\n<\/tr>\n<tr>\n<td>tkdacxp64.sys<\/td>\n<td>tkfsavxp.sys<\/td>\n<td>tkfsavxp64.sys<\/td>\n<td>tkfsft.sys<\/td>\n<td>tkfsft64.sys<\/td>\n<\/tr>\n<tr>\n<td>tkpcftcb.sys<\/td>\n<td>tkpcftcb64.sys<\/td>\n<td>tkpl2k.sys<\/td>\n<td>tkpl2k64.sys<\/td>\n<td>tksp2k.sys<\/td>\n<\/tr>\n<tr>\n<td>tkspxp.sys<\/td>\n<td>tkspxp64.sys<\/td>\n<td>tmactmon.sys<\/td>\n<td>tmcomm.sys<\/td>\n<td>tmesflt.sys<\/td>\n<\/tr>\n<tr>\n<td>tmevtmgr.sys<\/td>\n<td>tmeyes.sys<\/td>\n<td>tmfsdrv2.sys<\/td>\n<td>tmkmsnsr.sys<\/td>\n<td>tmnciesc.sys<\/td>\n<\/tr>\n<tr>\n<td>tmpreflt.sys<\/td>\n<td>tmumh.sys<\/td>\n<td>tmums.sys<\/td>\n<td>tmusa.sys<\/td>\n<td>tmxpflt.sys<\/td>\n<\/tr>\n<tr>\n<td>topdogfsfilt.sys<\/td>\n<td>trace.sys<\/td>\n<td>trfsfilter.sys<\/td>\n<td>tritiumfltr.sys<\/td>\n<td>trpmnflt.sys<\/td>\n<\/tr>\n<tr>\n<td>trufos.sys<\/td>\n<td>trustededgeffd.sys<\/td>\n<td>tsifilemon.sys<\/td>\n<td>tss.sys<\/td>\n<td>tstfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>tstfsredir.sys<\/td>\n<td>tstregredir.sys<\/td>\n<td>tsyscare.sys<\/td>\n<td>tvdriver.sys<\/td>\n<td>tvfiltr.sys<\/td>\n<\/tr>\n<tr>\n<td>tvmfltr.sys<\/td>\n<td>tvptfile.sys<\/td>\n<td>tvspfltr.sys<\/td>\n<td>twbdcfilter.sys<\/td>\n<td>txfilefilter.sys<\/td>\n<\/tr>\n<tr>\n<td>txregmon.sys<\/td>\n<td>uamflt.sys<\/td>\n<td>ucafltdriver.sys<\/td>\n<td>ufdfilter.sys<\/td>\n<td>uncheater.sys<\/td>\n<\/tr>\n<tr>\n<td>upguardrealtime.sys<\/td>\n<td>usbl_ifsfltr.sys<\/td>\n<td>usbpdh.sys<\/td>\n<td>usbtest.sys<\/td>\n<td>uvmcifsf.sys<\/td>\n<\/tr>\n<tr>\n<td>uwfreg.sys<\/td>\n<td>uwfs.sys<\/td>\n<td>v3flt2k.sys<\/td>\n<td>v3flu2k.sys<\/td>\n<td>v3ift2k.sys<\/td>\n<\/tr>\n<tr>\n<td>v3iftmnt.sys<\/td>\n<td>v3mifint.sys<\/td>\n<td>varpffmon.sys<\/td>\n<td>vast.sys<\/td>\n<td>vcdriv.sys<\/td>\n<\/tr>\n<tr>\n<td>vchle.sys<\/td>\n<td>vcmfilter.sys<\/td>\n<td>vcreg.sys<\/td>\n<td>veeamfct.sys<\/td>\n<td>vfdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>vfilefilter.sys<\/td>\n<td>vfpd.sys<\/td>\n<td>vfsenc.sys<\/td>\n<td>vhddelta.sys<\/td>\n<td>vhdtrack.sys<\/td>\n<\/tr>\n<tr>\n<td>vidderfs.sys<\/td>\n<td>vintmfs.sys<\/td>\n<td>virtfile.sys<\/td>\n<td>virtualagent.sys<\/td>\n<td>vk_fsf.sys<\/td>\n<\/tr>\n<tr>\n<td>vlflt.sys<\/td>\n<td>vmwvvpfsd.sys<\/td>\n<td>vollock.sys<\/td>\n<td>vpdrvnt.sys<\/td>\n<td>vradfil2.sys<\/td>\n<\/tr>\n<tr>\n<td>vraptdef.sys<\/td>\n<td>vraptflt.sys<\/td>\n<td>vrarnflt.sys<\/td>\n<td>vrbbdflt.sys<\/td>\n<td>vrexpdrv.sys<\/td>\n<\/tr>\n<tr>\n<td>vrfsftm.sys<\/td>\n<td>vrfsftmx.sys<\/td>\n<td>vrnsfilter.sys<\/td>\n<td>vrsdam.sys<\/td>\n<td>vrsdcore.sys<\/td>\n<\/tr>\n<tr>\n<td>vrsdetri.sys<\/td>\n<td>vrsdetrix.sys<\/td>\n<td>vrsdfmx.sys<\/td>\n<td>vrvbrfsfilter.sys<\/td>\n<td>vsepflt.sys<\/td>\n<\/tr>\n<tr>\n<td>vsscanner.sys<\/td>\n<td>vtsysflt.sys<\/td>\n<td>vxfsrep.sys<\/td>\n<td>wats_se.sys<\/td>\n<td>wbfilter.sys<\/td>\n<\/tr>\n<tr>\n<td>wcsdriver.sys<\/td>\n<td>wdcfilter.sys<\/td>\n<td>wdfilter.sys<\/td>\n<td>wdocsafe.sys<\/td>\n<td>wfp_mrt.sys<\/td>\n<\/tr>\n<tr>\n<td>wgfile.sys<\/td>\n<td>whiteshield.sys<\/td>\n<td>windbdrv.sys<\/td>\n<td>windd.sys<\/td>\n<td>winfladrv.sys<\/td>\n<\/tr>\n<tr>\n<td>winflahdrv.sys<\/td>\n<td>winfldrv.sys<\/td>\n<td>winfpdrv.sys<\/td>\n<td>winload.sys<\/td>\n<td>winteonminifilter.sys<\/td>\n<\/tr>\n<tr>\n<td>wiper.sys<\/td>\n<td>wlminisecmod.sys<\/td>\n<td>wntgpdrv.sys<\/td>\n<td>wraekernel.sys<\/td>\n<td>wrcore.sys<\/td>\n<\/tr>\n<tr>\n<td>wrcore.x64.sys<\/td>\n<td>wrdwizfileprot.sys<\/td>\n<td>wrdwizregprot.sys<\/td>\n<td>wrdwizscanner.sys<\/td>\n<td>wrdwizsecure64.sys<\/td>\n<\/tr>\n<tr>\n<td>wrkrn.sys<\/td>\n<td>wrpfv.sys<\/td>\n<td>wsafefilter.sys<\/td>\n<td>wscm.sys<\/td>\n<td>xcpl.sys<\/td>\n<\/tr>\n<tr>\n<td>xendowflt.sys<\/td>\n<td>xfsgk.sys<\/td>\n<td>xhunter1.sys<\/td>\n<td>xhunter64.sys<\/td>\n<td>xiaobaifs.sys<\/td>\n<\/tr>\n<tr>\n<td>xiaobaifsr.sys<\/td>\n<td>xkfsfd.sys<\/td>\n<td>xoiv8x64.sys<\/td>\n<td>xomfcbt8x64.sys<\/td>\n<td>yahoostorage.sys<\/td>\n<\/tr>\n<tr>\n<td>yfsd.sys<\/td>\n<td>yfsd2.sys<\/td>\n<td>yfsdr.sys<\/td>\n<td>yfsrd.sys<\/td>\n<td>zampit_ml.sys<\/td>\n<\/tr>\n<tr>\n<td>zesfsmf.sys<\/td>\n<td>zqfilter.sys<\/td>\n<td>zsfprt.sys<\/td>\n<td>zwasatom.sys<\/td>\n<td>zwpxesvr.sys<\/td>\n<\/tr>\n<tr>\n<td>zxfsfilt.sys<\/td>\n<td>zyfm.sys<\/td>\n<td>zzpensys.sys<\/td>\n<td>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h2 class=\"wp-block-heading\">Further reading<\/h2>\n<p>For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: <a href=\"https:\/\/aka.ms\/threatintelblog\">https:\/\/aka.ms\/threatintelblog<\/a>.<\/p>\n<p>To get notified about new publications and to join discussions on social media, follow us on Twitter at <a href=\"https:\/\/twitter.com\/MsftSecIntel\">https:\/\/twitter.com\/MsftSecIntel<\/a>. <\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/06\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent investigation by Microsoft Incident Response of a BlackByte 2.0 ransomware attack, we found that the threat actor progressed through the full attack chain, from initial access to impact, in less than five days, causing significant business disruption for the victim organization.<br \/>\nThe post The five-day job: A BlackByte ransomware intrusion case study appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52682,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-52681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The five-day job: A BlackByte ransomware intrusion case study 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The five-day job: A BlackByte ransomware intrusion case study 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-06T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-1024x514.webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The five-day job: A BlackByte ransomware intrusion case study\",\"datePublished\":\"2023-07-06T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\"},\"wordCount\":5419,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\",\"name\":\"The five-day job: A BlackByte ransomware intrusion case study 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp\",\"datePublished\":\"2023-07-06T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp\",\"width\":1024,\"height\":514},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The five-day job: A BlackByte ransomware intrusion case study\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The five-day job: A BlackByte ransomware intrusion case study 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/","og_locale":"en_US","og_type":"article","og_title":"The five-day job: A BlackByte ransomware intrusion case study 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-07-06T17:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/07\/BlackByte-attack-flow-diagram-1024x514.webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The five-day job: A BlackByte ransomware intrusion case study","datePublished":"2023-07-06T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/"},"wordCount":5419,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/","url":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/","name":"The five-day job: A BlackByte ransomware intrusion case study 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp","datePublished":"2023-07-06T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study.webp","width":1024,"height":514},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-five-day-job-a-blackbyte-ransomware-intrusion-case-study\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The five-day job: A BlackByte ransomware intrusion case study"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52681"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52681\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52682"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}