Analysis
-
max time kernel
28s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02/02/2021, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v20201028
General
-
Target
2.exe
-
Size
2.5MB
-
MD5
e63e41e15e86489a98dbeb2e6cb44e8a
-
SHA1
5815d349a375f5cdf090ababcff86b3946ed6c07
-
SHA256
0dd34e1326f18ab113be5ec91003577845f62ce25bbed8f92bff0b4077fe45da
-
SHA512
749d9580ac631916fbc1db207f0f48ed2ff9979f0cd8e352633cd86edfe7bd5bbb6da90b014e0b8ad639f8b9e567498f07353ef907ce2bd6dfa5536d3079991e
Malware Config
Extracted
C:\Users\Admin\Desktop\Recovery_Instructions.txt
Extracted
C:\Recovery_Instructions.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3844 bcdedit.exe 3852 bcdedit.exe -
pid Process 3684 wbadmin.exe 276 wbadmin.exe -
Drops file in Drivers directory 12 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 2.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 2.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.ReadInstructions 2.exe File opened for modification C:\Windows\System32\drivers\etc\services 2.exe File opened for modification C:\Windows\System32\drivers\etc\services.ReadInstructions 2.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.ReadInstructions 2.exe File opened for modification C:\Windows\System32\drivers\etc\networks 2.exe File opened for modification C:\Windows\System32\drivers\etc\networks.ReadInstructions 2.exe -
Modifies extensions of user files 30 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompleteSelect.png => C:\Users\Admin\Pictures\CompleteSelect.png.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\FindAdd.tiff.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\FindAdd.tiff.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\GrantClose.tiff.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\MountDisable.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\InvokeRequest.tif => C:\Users\Admin\Pictures\InvokeRequest.tif.inprocess 2.exe File renamed C:\Users\Admin\Pictures\InvokeRequest.tif.inprocess => C:\Users\Admin\Pictures\InvokeRequest.tif.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\CompleteSelect.png.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\CompleteSelect.png.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\FindAdd.tiff 2.exe File renamed C:\Users\Admin\Pictures\FindAdd.tiff.inprocess => C:\Users\Admin\Pictures\FindAdd.tiff.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\GrantClose.tiff.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\GrantClose.tiff 2.exe File opened for modification C:\Users\Admin\Pictures\MountDisable.png.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\RenamePublish.raw.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\GrantClose.tiff => C:\Users\Admin\Pictures\GrantClose.tiff.inprocess 2.exe File renamed C:\Users\Admin\Pictures\GrantClose.tiff.inprocess => C:\Users\Admin\Pictures\GrantClose.tiff.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\InvokeRequest.tif.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\InvokeRequest.tif.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\MountDisable.png => C:\Users\Admin\Pictures\MountDisable.png.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\ResizeRename.png.inprocess 2.exe File renamed C:\Users\Admin\Pictures\ResizeRename.png.inprocess => C:\Users\Admin\Pictures\ResizeRename.png.ReadInstructions 2.exe File opened for modification C:\Users\Admin\Pictures\ResizeRename.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\CompleteSelect.png.inprocess => C:\Users\Admin\Pictures\CompleteSelect.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\MountDisable.png.inprocess => C:\Users\Admin\Pictures\MountDisable.png.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\RenamePublish.raw => C:\Users\Admin\Pictures\RenamePublish.raw.inprocess 2.exe File renamed C:\Users\Admin\Pictures\RenamePublish.raw.inprocess => C:\Users\Admin\Pictures\RenamePublish.raw.ReadInstructions 2.exe File renamed C:\Users\Admin\Pictures\ResizeRename.png => C:\Users\Admin\Pictures\ResizeRename.png.inprocess 2.exe File renamed C:\Users\Admin\Pictures\FindAdd.tiff => C:\Users\Admin\Pictures\FindAdd.tiff.inprocess 2.exe File opened for modification C:\Users\Admin\Pictures\RenamePublish.raw.inprocess 2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run 2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2.exe\" e" 2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini 2.exe -
Enumerates connected drives 3 TTPs 41 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\F: 2.exe File opened (read-only) \??\G: 2.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\I: 2.exe File opened (read-only) \??\P: 2.exe File opened (read-only) \??\Z: 2.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\A: 2.exe File opened (read-only) \??\L: 2.exe File opened (read-only) \??\S: 2.exe File opened (read-only) \??\E: 2.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\M: 2.exe File opened (read-only) \??\Y: 2.exe File opened (read-only) \??\D: 2.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\N: 2.exe File opened (read-only) \??\Q: 2.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\J: 2.exe File opened (read-only) \??\O: 2.exe File opened (read-only) \??\V: 2.exe File opened (read-only) \??\H: 2.exe File opened (read-only) \??\R: 2.exe File opened (read-only) \??\U: 2.exe File opened (read-only) \??\X: 2.exe File opened (read-only) \??\B: 2.exe File opened (read-only) \??\K: 2.exe File opened (read-only) \??\T: 2.exe File opened (read-only) \??\W: 2.exe -
Drops file in System32 directory 100 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\BCD-Template.inprocess 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\272cc0ac-516b-43d0-b371-37fd4c92d1e0.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83.ReadInstructions 2.exe File opened for modification C:\Windows\System32\ResPriHMImageList 2.exe File opened for modification C:\Windows\System32\ResPriImageList 2.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.inprocess 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\272cc0ac-516b-43d0-b371-37fd4c92d1e0.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6.inprocess 2.exe File opened for modification C:\Windows\System32\config\BBI 2.exe File opened for modification C:\Windows\System32\config\SAM 2.exe File opened for modification C:\Windows\System32\config\RegBack\SECURITY 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\d8f02fab-50bd-431d-b24d-4a8829b3f813 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess 2.exe File opened for modification C:\Windows\System32\config\VSMIDK.ReadInstructions 2.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb 2.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb 2.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\678096c8-b266-4d75-ab1d-0b7ef7584d24.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.inprocess 2.exe File opened for modification C:\Windows\System32\config\SYSTEM 2.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\678096c8-b266-4d75-ab1d-0b7ef7584d24 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\678096c8-b266-4d75-ab1d-0b7ef7584d24.inprocess 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\98301ca1-0a97-4b50-941d-2da843986a6e.inprocess 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\d8f02fab-50bd-431d-b24d-4a8829b3f813.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\ELAM.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess 2.exe File opened for modification C:\Windows\System32\config\DEFAULT 2.exe File opened for modification C:\Windows\System32\config\SECURITY 2.exe File opened for modification C:\Windows\System32\config\VSMIDK.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 2.exe File opened for modification C:\Windows\System32\config\ELAM.inprocess 2.exe File opened for modification C:\Windows\System32\config\SOFTWARE 2.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.ReadInstructions 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred 2.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\COMPONENTS 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\98301ca1-0a97-4b50-941d-2da843986a6e 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\d8f02fab-50bd-431d-b24d-4a8829b3f813.inprocess 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.inprocess 2.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\BCD-Template 2.exe File opened for modification C:\Windows\System32\config\RegBack\DEFAULT 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\RegBack\SYSTEM 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\272cc0ac-516b-43d0-b371-37fd4c92d1e0 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\BCD-Template.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\DRIVERS 2.exe File opened for modification C:\Windows\System32\config\RegBack\SAM 2.exe File opened for modification C:\Windows\System32\config\RegBack\SOFTWARE 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 2.exe File opened for modification C:\Windows\System32\config\COMPONENTS.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\ELAM 2.exe File opened for modification C:\Windows\System32\config\VSMIDK 2.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\98301ca1-0a97-4b50-941d-2da843986a6e.ReadInstructions 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead.inprocess 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 2.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.inprocess 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3912 2.exe -
Drops file in Program Files directory 49 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.ReadInstructions 2.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 2.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess 2.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.ReadInstructions 2.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess 2.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.ReadInstructions 2.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 2.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.ReadInstructions 2.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.ReadInstructions 2.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 2.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 2.exe -
Drops file in Windows directory 68 IoCs
description ioc Process File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660}.ReadInstructions 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F} 2.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr 2.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD 2.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} 2.exe File opened for modification C:\Windows\Panther\setupinfo 2.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} 2.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C} 2.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.inprocess 2.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD 2.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4a1d5b5d-6336-41a4-a4da-b4af65e6deff 2.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.inprocess 2.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97} 2.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.ReadInstructions 2.exe File opened for modification C:\Windows\Boot\PCAT\bootnxt 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660} 2.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.inprocess 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4a1d5b5d-6336-41a4-a4da-b4af65e6deff.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707} 2.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6} 2.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.ReadInstructions 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.inprocess 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7} 2.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00} 2.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660}.inprocess 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.inprocess 2.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.inprocess 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_4a1d5b5d-6336-41a4-a4da-b4af65e6deff.inprocess 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0} 2.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.ReadInstructions 2.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.inprocess 2.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.ReadInstructions 2.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 2.exe File opened for modification C:\Windows\Panther\setupinfo.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.ReadInstructions 2.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE} 2.exe File opened for modification C:\Windows\Resources\Maps\mwconfig_client 2.exe -
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 272 vssadmin.exe 3928 vssadmin.exe 3960 vssadmin.exe 3948 vssadmin.exe 188 vssadmin.exe 3504 vssadmin.exe 1576 vssadmin.exe 3156 vssadmin.exe 4048 vssadmin.exe 1116 vssadmin.exe 2476 vssadmin.exe 3908 vssadmin.exe 3504 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2044 IoCs
pid Process 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe 3912 2.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeBackupPrivilege 2060 vssvc.exe Token: SeRestorePrivilege 2060 vssvc.exe Token: SeAuditPrivilege 2060 vssvc.exe Token: SeIncreaseQuotaPrivilege 2816 wmic.exe Token: SeSecurityPrivilege 2816 wmic.exe Token: SeTakeOwnershipPrivilege 2816 wmic.exe Token: SeLoadDriverPrivilege 2816 wmic.exe Token: SeSystemProfilePrivilege 2816 wmic.exe Token: SeSystemtimePrivilege 2816 wmic.exe Token: SeProfSingleProcessPrivilege 2816 wmic.exe Token: SeIncBasePriorityPrivilege 2816 wmic.exe Token: SeCreatePagefilePrivilege 2816 wmic.exe Token: SeBackupPrivilege 2816 wmic.exe Token: SeRestorePrivilege 2816 wmic.exe Token: SeShutdownPrivilege 2816 wmic.exe Token: SeDebugPrivilege 2816 wmic.exe Token: SeSystemEnvironmentPrivilege 2816 wmic.exe Token: SeRemoteShutdownPrivilege 2816 wmic.exe Token: SeUndockPrivilege 2816 wmic.exe Token: SeManageVolumePrivilege 2816 wmic.exe Token: 33 2816 wmic.exe Token: 34 2816 wmic.exe Token: 35 2816 wmic.exe Token: 36 2816 wmic.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3912 wrote to memory of 1116 3912 2.exe 72 PID 3912 wrote to memory of 1116 3912 2.exe 72 PID 3912 wrote to memory of 2476 3912 2.exe 78 PID 3912 wrote to memory of 2476 3912 2.exe 78 PID 3912 wrote to memory of 188 3912 2.exe 80 PID 3912 wrote to memory of 188 3912 2.exe 80 PID 3912 wrote to memory of 3504 3912 2.exe 83 PID 3912 wrote to memory of 3504 3912 2.exe 83 PID 3912 wrote to memory of 1576 3912 2.exe 85 PID 3912 wrote to memory of 1576 3912 2.exe 85 PID 3912 wrote to memory of 3156 3912 2.exe 87 PID 3912 wrote to memory of 3156 3912 2.exe 87 PID 3912 wrote to memory of 3908 3912 2.exe 89 PID 3912 wrote to memory of 3908 3912 2.exe 89 PID 3912 wrote to memory of 272 3912 2.exe 91 PID 3912 wrote to memory of 272 3912 2.exe 91 PID 3912 wrote to memory of 3928 3912 2.exe 93 PID 3912 wrote to memory of 3928 3912 2.exe 93 PID 3912 wrote to memory of 3960 3912 2.exe 95 PID 3912 wrote to memory of 3960 3912 2.exe 95 PID 3912 wrote to memory of 3948 3912 2.exe 97 PID 3912 wrote to memory of 3948 3912 2.exe 97 PID 3912 wrote to memory of 3504 3912 2.exe 99 PID 3912 wrote to memory of 3504 3912 2.exe 99 PID 3912 wrote to memory of 4048 3912 2.exe 101 PID 3912 wrote to memory of 4048 3912 2.exe 101 PID 3912 wrote to memory of 3844 3912 2.exe 103 PID 3912 wrote to memory of 3844 3912 2.exe 103 PID 3912 wrote to memory of 3852 3912 2.exe 105 PID 3912 wrote to memory of 3852 3912 2.exe 105 PID 3912 wrote to memory of 3684 3912 2.exe 107 PID 3912 wrote to memory of 3684 3912 2.exe 107 PID 3912 wrote to memory of 276 3912 2.exe 109 PID 3912 wrote to memory of 276 3912 2.exe 109 PID 3912 wrote to memory of 2816 3912 2.exe 111 PID 3912 wrote to memory of 2816 3912 2.exe 111 PID 3912 wrote to memory of 1116 3912 2.exe 117 PID 3912 wrote to memory of 1116 3912 2.exe 117 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"1⤵
- Drops file in Drivers directory
- Modifies extensions of user files
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3912 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:1116
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:2476
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:188
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3504
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1576
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3156
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3908
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:272
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3928
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3960
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3948
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3504
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:4048
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:3844
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3852
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:3684
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:276
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2.exe >> NUL2⤵PID:1116
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2060