Analysis
-
max time kernel
158s -
max time network
161s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-08-2021 21:06
Static task
static1
Behavioral task
behavioral1
Sample
b8f76d9cd83557379f3fe8b5dd080f9a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b8f76d9cd83557379f3fe8b5dd080f9a.exe
Resource
win10v20210408
General
-
Target
b8f76d9cd83557379f3fe8b5dd080f9a.exe
-
Size
274KB
-
MD5
b8f76d9cd83557379f3fe8b5dd080f9a
-
SHA1
5420b910b3230a670a79a6193fc76a7864a51967
-
SHA256
a92eb964d56ff8dccb926598aca597a6244d10334f264aafcba9752a30dbe9b3
-
SHA512
bab66ea8ffc11c79f0312f3d551b6230ae3f7b79125121fd5af8e3310f967aef8b77bafa2552a2fdbd2b08024b5d8719ec3821e47e67ba42e5a66150c30594ac
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
WORD1
94.26.249.88:1902
Extracted
raccoon
20d9c80657d1d0fda9625cbd629ba419b8a34404
-
url4cnc
https://telete.in/hfuimoneymake
Extracted
redline
nn
135.181.49.56:47634
Extracted
redline
superstar75737
95.181.152.190:33007
Extracted
redline
1000
94.103.9.138:80
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
Processes:
resource yara_rule behavioral2/memory/1496-144-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/1496-145-0x000000000041A68E-mapping.dmp family_redline behavioral2/memory/1496-161-0x0000000004F00000-0x0000000005506000-memory.dmp family_redline behavioral2/memory/3140-203-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3140-205-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/2672-264-0x0000000003B00000-0x0000000003B1F000-memory.dmp family_redline behavioral2/memory/2672-271-0x0000000003B80000-0x0000000003B9E000-memory.dmp family_redline behavioral2/files/0x000300000001ab6f-368.dat family_redline behavioral2/files/0x000300000001ab6f-388.dat family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000700000001ab6e-359.dat family_stormkitty behavioral2/files/0x000700000001ab6e-358.dat family_stormkitty -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid Process procid_target PID 2224 created 4092 2224 WerFault.exe 79 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000700000001ab6e-359.dat asyncrat behavioral2/files/0x000700000001ab6e-358.dat asyncrat -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 4 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001ab65-178.dat Nirsoft behavioral2/files/0x000100000001ab65-181.dat Nirsoft behavioral2/files/0x000100000001ab65-183.dat Nirsoft behavioral2/memory/3140-231-0x0000000009710000-0x0000000009D16000-memory.dmp Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
Processes:
F65C.exeF757.exeFD34.exe9A8.exeEBA.exe1330.exeAdvancedRun.exeAdvancedRun.exe2300.exe24C6.exeTrustedInstaller.exeFineeest_.exePryntVirus.exe1000 hq.exeTrustedInstaller.exepid Process 4092 F65C.exe 4204 F757.exe 4124 FD34.exe 1132 9A8.exe 1752 EBA.exe 2672 1330.exe 4052 AdvancedRun.exe 4344 AdvancedRun.exe 4432 2300.exe 2900 24C6.exe 4224 TrustedInstaller.exe 3176 Fineeest_.exe 412 PryntVirus.exe 208 1000 hq.exe 3828 TrustedInstaller.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Fineeest_.exeFD34.exe9A8.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fineeest_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FD34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FD34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9A8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9A8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fineeest_.exe -
Deletes itself 1 IoCs
Processes:
pid Process 3048 -
Loads dropped DLL 1 IoCs
Processes:
F65C.exepid Process 4092 F65C.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/files/0x000200000001ab5f-127.dat themida behavioral2/files/0x000200000001ab5f-128.dat themida behavioral2/memory/4124-131-0x0000000000230000-0x0000000000231000-memory.dmp themida behavioral2/files/0x000200000001ab60-141.dat themida behavioral2/files/0x000200000001ab60-143.dat themida behavioral2/memory/1132-153-0x0000000000AD0000-0x0000000000AD1000-memory.dmp themida behavioral2/files/0x000b00000001ab6d-353.dat themida behavioral2/files/0x000b00000001ab6d-372.dat themida -
Uses the VBS compiler for execution 1 TTPs
-
Processes:
EBA.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths EBA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\EBA.exe = "0" EBA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection EBA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" EBA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" EBA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" EBA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" EBA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions EBA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet EBA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features EBA.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
24C6.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 24C6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\TrustedInstaller.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\TrustedInstaller.exe\" -start" 24C6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
FD34.exe9A8.exeEBA.exeFineeest_.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FD34.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9A8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EBA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" EBA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Fineeest_.exe -
Drops desktop.ini file(s) 7 IoCs
Processes:
PryntVirus.exedescription ioc Process File created C:\Users\Admin\AppData\Local\ef40b4615d1ffed76b2bee77e41bcb49\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\ef40b4615d1ffed76b2bee77e41bcb49\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\ef40b4615d1ffed76b2bee77e41bcb49\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\ef40b4615d1ffed76b2bee77e41bcb49\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\ef40b4615d1ffed76b2bee77e41bcb49\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini PryntVirus.exe File opened for modification C:\Users\Admin\AppData\Local\ef40b4615d1ffed76b2bee77e41bcb49\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\ef40b4615d1ffed76b2bee77e41bcb49\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini PryntVirus.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
TrustedInstaller.exedescription ioc Process File opened (read-only) \??\T: TrustedInstaller.exe File opened (read-only) \??\P: TrustedInstaller.exe File opened (read-only) \??\M: TrustedInstaller.exe File opened (read-only) \??\K: TrustedInstaller.exe File opened (read-only) \??\I: TrustedInstaller.exe File opened (read-only) \??\Z: TrustedInstaller.exe File opened (read-only) \??\Y: TrustedInstaller.exe File opened (read-only) \??\R: TrustedInstaller.exe File opened (read-only) \??\L: TrustedInstaller.exe File opened (read-only) \??\A: TrustedInstaller.exe File opened (read-only) \??\U: TrustedInstaller.exe File opened (read-only) \??\S: TrustedInstaller.exe File opened (read-only) \??\O: TrustedInstaller.exe File opened (read-only) \??\J: TrustedInstaller.exe File opened (read-only) \??\H: TrustedInstaller.exe File opened (read-only) \??\G: TrustedInstaller.exe File opened (read-only) \??\E: TrustedInstaller.exe File opened (read-only) \??\X: TrustedInstaller.exe File opened (read-only) \??\W: TrustedInstaller.exe File opened (read-only) \??\V: TrustedInstaller.exe File opened (read-only) \??\Q: TrustedInstaller.exe File opened (read-only) \??\N: TrustedInstaller.exe File opened (read-only) \??\F: TrustedInstaller.exe File opened (read-only) \??\B: TrustedInstaller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 geoiptool.com 77 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
FD34.exe9A8.exeFineeest_.exepid Process 4124 FD34.exe 1132 9A8.exe 3176 Fineeest_.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b8f76d9cd83557379f3fe8b5dd080f9a.exeF757.exeEBA.exedescription pid Process procid_target PID 4648 set thread context of 3592 4648 b8f76d9cd83557379f3fe8b5dd080f9a.exe 75 PID 4204 set thread context of 1496 4204 F757.exe 85 PID 1752 set thread context of 3140 1752 EBA.exe 109 -
Drops file in Program Files directory 64 IoCs
Processes:
TrustedInstaller.exedescription ioc Process File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\lv\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_Bark.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_win7.css TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\DEEPBLUE\PREVIEW.GIF TrustedInstaller.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Content\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Trial-ppd.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-ul-phn.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ARCTIC\THMBNAIL.PNG TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.scale-100_contrast-white.png TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-explorer.xml TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\Weather_BadgeLogo.scale-100.png TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-200.png TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ppd.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.scale-125.png TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\DailyChallenges\LargeSpiderTile.jpg TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Logos\Square71x71\PaintSmallTile.scale-125.png TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\SFMESSAGES.XML TrustedInstaller.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt.payfast290.BEB-200-31C TrustedInstaller.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\font\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BOOKOSBI.TTF TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\feature.xml.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL117.XML.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.xml.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler.xml TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\mix.gif.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemePreview\Backgrounds\Beach.jpg TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\4642_40x40x32.png TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial1-ul-oob.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_2015.7668.58071.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach.zh_CN_5.5.0.165303.jar.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.filesystem_1.4.100.v20140514-1614.jar TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EXPEDITN\EXPEDITN.INF TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-100_contrast-black.png TrustedInstaller.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\XboxFlow\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-ppd.xrm-ms.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Spacer\6px.png TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_neutral_split.scale-140_8wekyb3d8bbwe\Assets\Office\PlaneCutKeepBoth.scale-140.png TrustedInstaller.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Trial-pl.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11701.1001.87.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreLargeTile.scale-100.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core_zh_CN.jar TrustedInstaller.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.3_1.3.24201.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\JSByteCodeCache_64 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\jaccess.jar.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-ppd.xrm-ms.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-ppd.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\XboxFlow\background.png TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-nodes_zh_CN.jar TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_MAKC2R-ul-oob.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBHW6.CHM TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.intro.nl_zh_4.4.0.v20140623020002.jar.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring.xml TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_KMS_Client_AE-ul.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymk.ttf TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ChronologicalLetter.dotx TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BOLDSTRI\BOLDSTRI.INF.payfast290.BEB-200-31C TrustedInstaller.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png TrustedInstaller.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\challenge\Go_for_the_Silver_Unearned_small.png TrustedInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 4388 4092 WerFault.exe 79 4496 4092 WerFault.exe 79 2892 4092 WerFault.exe 79 180 4092 WerFault.exe 79 1964 4092 WerFault.exe 79 4316 4092 WerFault.exe 79 5088 4092 WerFault.exe 79 3832 4092 WerFault.exe 79 1108 4092 WerFault.exe 79 3992 4092 WerFault.exe 79 2892 4092 WerFault.exe 79 2384 4092 WerFault.exe 79 4500 4092 WerFault.exe 79 2224 4092 WerFault.exe 79 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
b8f76d9cd83557379f3fe8b5dd080f9a.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b8f76d9cd83557379f3fe8b5dd080f9a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b8f76d9cd83557379f3fe8b5dd080f9a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b8f76d9cd83557379f3fe8b5dd080f9a.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
PryntVirus.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PryntVirus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PryntVirus.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 4012 vssadmin.exe 2472 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b8f76d9cd83557379f3fe8b5dd080f9a.exepid Process 3592 b8f76d9cd83557379f3fe8b5dd080f9a.exe 3592 b8f76d9cd83557379f3fe8b5dd080f9a.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 3048 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
b8f76d9cd83557379f3fe8b5dd080f9a.exepid Process 3592 b8f76d9cd83557379f3fe8b5dd080f9a.exe 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 3048 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
F757.exeAdvancedRun.exeWerFault.exeAdvancedRun.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeEBA.exe9A8.exepowershell.exepowershell.exeWerFault.exe24C6.exeWerFault.exeWerFault.exeWerFault.exevbc.exeWerFault.exeWerFault.exedescription pid Process Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4204 F757.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 4052 AdvancedRun.exe Token: SeImpersonatePrivilege 4052 AdvancedRun.exe Token: SeRestorePrivilege 4388 WerFault.exe Token: SeBackupPrivilege 4388 WerFault.exe Token: SeDebugPrivilege 4344 AdvancedRun.exe Token: SeImpersonatePrivilege 4344 AdvancedRun.exe Token: SeDebugPrivilege 4388 WerFault.exe Token: SeDebugPrivilege 4496 explorer.exe Token: SeDebugPrivilege 2892 WerFault.exe Token: SeDebugPrivilege 180 WerFault.exe Token: SeDebugPrivilege 1964 WerFault.exe Token: SeDebugPrivilege 4316 WerFault.exe Token: SeDebugPrivilege 1752 EBA.exe Token: SeDebugPrivilege 1132 9A8.exe Token: SeDebugPrivilege 5088 Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 3832 WerFault.exe Token: SeDebugPrivilege 2900 24C6.exe Token: SeDebugPrivilege 2900 24C6.exe Token: SeDebugPrivilege 1108 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeDebugPrivilege 3992 WerFault.exe Token: SeDebugPrivilege 2892 WerFault.exe Token: SeDebugPrivilege 2384 WerFault.exe Token: SeDebugPrivilege 3140 vbc.exe Token: SeDebugPrivilege 4500 WerFault.exe Token: SeDebugPrivilege 2224 WerFault.exe Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 Token: SeShutdownPrivilege 3048 Token: SeCreatePagefilePrivilege 3048 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3048 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b8f76d9cd83557379f3fe8b5dd080f9a.exeF757.exeEBA.exeAdvancedRun.exedescription pid Process procid_target PID 4648 wrote to memory of 3592 4648 b8f76d9cd83557379f3fe8b5dd080f9a.exe 75 PID 4648 wrote to memory of 3592 4648 b8f76d9cd83557379f3fe8b5dd080f9a.exe 75 PID 4648 wrote to memory of 3592 4648 b8f76d9cd83557379f3fe8b5dd080f9a.exe 75 PID 4648 wrote to memory of 3592 4648 b8f76d9cd83557379f3fe8b5dd080f9a.exe 75 PID 4648 wrote to memory of 3592 4648 b8f76d9cd83557379f3fe8b5dd080f9a.exe 75 PID 4648 wrote to memory of 3592 4648 b8f76d9cd83557379f3fe8b5dd080f9a.exe 75 PID 3048 wrote to memory of 4092 3048 79 PID 3048 wrote to memory of 4092 3048 79 PID 3048 wrote to memory of 4092 3048 79 PID 3048 wrote to memory of 4204 3048 80 PID 3048 wrote to memory of 4204 3048 80 PID 3048 wrote to memory of 4204 3048 80 PID 3048 wrote to memory of 4124 3048 81 PID 3048 wrote to memory of 4124 3048 81 PID 3048 wrote to memory of 4124 3048 81 PID 3048 wrote to memory of 1132 3048 83 PID 3048 wrote to memory of 1132 3048 83 PID 3048 wrote to memory of 1132 3048 83 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 4204 wrote to memory of 1496 4204 F757.exe 85 PID 3048 wrote to memory of 1752 3048 87 PID 3048 wrote to memory of 1752 3048 87 PID 3048 wrote to memory of 1752 3048 87 PID 3048 wrote to memory of 2672 3048 88 PID 3048 wrote to memory of 2672 3048 88 PID 3048 wrote to memory of 2672 3048 88 PID 1752 wrote to memory of 4052 1752 EBA.exe 90 PID 1752 wrote to memory of 4052 1752 EBA.exe 90 PID 1752 wrote to memory of 4052 1752 EBA.exe 90 PID 4052 wrote to memory of 4344 4052 AdvancedRun.exe 93 PID 4052 wrote to memory of 4344 4052 AdvancedRun.exe 93 PID 4052 wrote to memory of 4344 4052 AdvancedRun.exe 93 PID 3048 wrote to memory of 4432 3048 96 PID 3048 wrote to memory of 4432 3048 96 PID 3048 wrote to memory of 2900 3048 98 PID 3048 wrote to memory of 2900 3048 98 PID 3048 wrote to memory of 2900 3048 98 PID 3048 wrote to memory of 4588 3048 99 PID 3048 wrote to memory of 4588 3048 99 PID 3048 wrote to memory of 4588 3048 99 PID 3048 wrote to memory of 4588 3048 99 PID 3048 wrote to memory of 3648 3048 102 PID 3048 wrote to memory of 3648 3048 102 PID 3048 wrote to memory of 3648 3048 102 PID 3048 wrote to memory of 1532 3048 104 PID 3048 wrote to memory of 1532 3048 104 PID 3048 wrote to memory of 1532 3048 104 PID 3048 wrote to memory of 1532 3048 104 PID 1752 wrote to memory of 2088 1752 EBA.exe 105 PID 1752 wrote to memory of 2088 1752 EBA.exe 105 PID 1752 wrote to memory of 2088 1752 EBA.exe 105 PID 1752 wrote to memory of 2132 1752 EBA.exe 107 PID 1752 wrote to memory of 2132 1752 EBA.exe 107 PID 1752 wrote to memory of 2132 1752 EBA.exe 107 PID 1752 wrote to memory of 3140 1752 EBA.exe 109 PID 1752 wrote to memory of 3140 1752 EBA.exe 109 PID 1752 wrote to memory of 3140 1752 EBA.exe 109 PID 1752 wrote to memory of 3140 1752 EBA.exe 109 -
System policy modification 1 TTPs 1 IoCs
Processes:
EBA.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" EBA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f76d9cd83557379f3fe8b5dd080f9a.exe"C:\Users\Admin\AppData\Local\Temp\b8f76d9cd83557379f3fe8b5dd080f9a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\b8f76d9cd83557379f3fe8b5dd080f9a.exe"C:\Users\Admin\AppData\Local\Temp\b8f76d9cd83557379f3fe8b5dd080f9a.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\F65C.exeC:\Users\Admin\AppData\Local\Temp\F65C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 7322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 7482⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 7522⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 8802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 11842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 12482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 8362⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 11962⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 13082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 8282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 13202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 12882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 13722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 12402⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\F757.exeC:\Users\Admin\AppData\Local\Temp\F757.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\FD34.exeC:\Users\Admin\AppData\Local\Temp\FD34.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4124
-
C:\Users\Admin\AppData\Local\Temp\9A8.exeC:\Users\Admin\AppData\Local\Temp\9A8.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
C:\Users\Admin\AppData\Local\Temp\EBA.exeC:\Users\Admin\AppData\Local\Temp\EBA.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\9d287169-f322-41a5-af1a-2d9817e29c04\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\9d287169-f322-41a5-af1a-2d9817e29c04\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\9d287169-f322-41a5-af1a-2d9817e29c04\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\9d287169-f322-41a5-af1a-2d9817e29c04\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\9d287169-f322-41a5-af1a-2d9817e29c04\AdvancedRun.exe" /SpecialRun 4101d8 40523⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\EBA.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\EBA.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\1330.exeC:\Users\Admin\AppData\Local\Temp\1330.exe1⤵
- Executes dropped EXE
PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2300.exeC:\Users\Admin\AppData\Local\Temp\2300.exe1⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Fineeest_.exe"C:\Users\Admin\AppData\Local\Temp\Fineeest_.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\PryntVirus.exe"C:\Users\Admin\AppData\Local\Temp\PryntVirus.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:412 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵PID:2604
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1012
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:2200
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵PID:3236
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:4292
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵PID:4304
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\PryntVirus.exe"3⤵
- Creates scheduled task(s)
PID:648
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000 hq.exe"C:\Users\Admin\AppData\Local\Temp\1000 hq.exe"2⤵
- Executes dropped EXE
PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\24C6.exeC:\Users\Admin\AppData\Local\Temp\24C6.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:4224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:4380
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:4344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:4936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:212
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:3168
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:1968
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:5112
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2472
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:4864
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:392
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4588
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3648
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1532
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5116
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3028
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4252
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2220
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1508
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3120
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3092
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Modify Registry
6Scripting
1Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD55703edef7cb0f99305a6b18845e0443e
SHA1fb6f022ebde210306e1a6575462d6451e98af454
SHA256e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883
SHA5124631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD5888f7457c332ac5e1897316e159f58c1
SHA1a3047c6e978158dfae29b5735e8131ec1b30703d
SHA256c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41
SHA5120abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5939460925953ce88e1086341b8a11bda
SHA106249b891050a9fac128ccfee943aeb5bede1c7b
SHA256d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016
SHA512a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD50922f87848c66df385ecfc449f237b77
SHA16520cada7a884b56f0794641fe97aea17053ca19
SHA2568937ecb20f9a0c315d2b4a425fbc0f5f684d13cc4034cc551bc15a1d1baf4c47
SHA5122756a6ec7051379461642e24cf71ef3f33b0d707f851fb78aaeff3d1745383c5a8a1c2e293b54deb16356cb0ef79f7b97f0b103a680f1e06288092a1d7f168ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD5aa0d0ff5a38bfb04bf875f814e08c75d
SHA18aad1e2c98673507f421059dc2ebdc7fab1a5dfb
SHA256ef7f74b7a7b1ce8e846d8ecbc5e2cca7b6913b5d64f67cc86432e8ed7afc0863
SHA512021c2edc17de5a7ff9a6581dcb8e2dba774fed9fd1847e4e26f496a21dfd3802b0dab71d517b0a3ab566589157a7eab9c84f99264d5637c9cde0174a070889a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5760dab41fd958c2b768ca2c0112f151f
SHA1ada33777d580bd0ba8c439a0c7d5bd6191e7135a
SHA256ceeedd053fdaeeb668fc6f7c6885a8dbea019e3b6326b04e8b478f046da8dfe2
SHA512a02122082f8e01799fa74fed7b5e64e0a0d2206dab0f18e49150d85e4be764e25085699d7fddea9be6d808ed106c5d1941af63b084866f3071ba55d1a6ff8536
-
MD5
db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
MD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
MD5
8615e70875c2cc0b9db16027b9adf11d
SHA14ed62cf405311c0ff562a3c59334a15ddc4f1bf9
SHA256da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d
SHA512cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73
-
MD5
7247129cd0644457905b7d6bf17fd078
SHA1dbf9139b5a1b72141f170d2eae911bbbe7e128c8
SHA256dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4
SHA5129b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0
-
MD5
b1eec6cab72ba78a82b836f73cf07d35
SHA1154e5599216de5051d82727395237d6f57c5103b
SHA256907d36c5155c7dd74a9e68dab28050f7ac1eb71ec5ebd535b065e92997228398
SHA512a00e7d2b4f640b6f3e4e04c4eaea21c9ec87581318734bba715bc6ecd647f1fbad879d8185935033e271cf0415ed4b8a2fcce1b8bd866419e33d5840087e33a5
-
MD5
80e9d57e4ad9e2fde3c762de3544279f
SHA126f5d127e552dde5e0ea808d998fcacc63113376
SHA256ef5c9536cf221c5556ea78e39e4df0b7aa839f2028aa6b67d28f57810e484be1
SHA5128a4996d6f289ebfb016127a62b835512178fd745fe527e16275429c543a4842529538202d78426686aebbb63132d762eb90f8f1dfa7cd2e5304abe73465f1c86
-
MD5
80e9d57e4ad9e2fde3c762de3544279f
SHA126f5d127e552dde5e0ea808d998fcacc63113376
SHA256ef5c9536cf221c5556ea78e39e4df0b7aa839f2028aa6b67d28f57810e484be1
SHA5128a4996d6f289ebfb016127a62b835512178fd745fe527e16275429c543a4842529538202d78426686aebbb63132d762eb90f8f1dfa7cd2e5304abe73465f1c86
-
MD5
43f4cc97f9c3b68e1db78db89ac87a14
SHA1d3d81969c817c2f576585f1998b8b35f1823e82d
SHA256d02f3776c40bb08e92b7c39e24effb855174d9db0337f303a35a068dbd59e922
SHA512afc3ee9785c193b988c70d3e0a32c23a2bf3d6271b7ce28a1fb7de1de3c9ac64d0a2fef5b1cec16383a7e68e0b94aacaeaeb05db787a9a5515b8e839b9b12b7a
-
MD5
43f4cc97f9c3b68e1db78db89ac87a14
SHA1d3d81969c817c2f576585f1998b8b35f1823e82d
SHA256d02f3776c40bb08e92b7c39e24effb855174d9db0337f303a35a068dbd59e922
SHA512afc3ee9785c193b988c70d3e0a32c23a2bf3d6271b7ce28a1fb7de1de3c9ac64d0a2fef5b1cec16383a7e68e0b94aacaeaeb05db787a9a5515b8e839b9b12b7a
-
MD5
a27bb701996b02f907c05e83a2793814
SHA145cf24838dc199df772f78d480d3eb31754714bc
SHA256648b91f171dbe77bad4b08b6ba16734bc5523bfe58c89c34fbac98a054c39edd
SHA5129b18aca25563f0dd6e20c3deb41834b55d5455dde7ef802b291e95475d23c99a1f8f5c0d0b227028f578610292b3ba4ff0b528785cec821af2daf4fa93ea6d13
-
MD5
a27bb701996b02f907c05e83a2793814
SHA145cf24838dc199df772f78d480d3eb31754714bc
SHA256648b91f171dbe77bad4b08b6ba16734bc5523bfe58c89c34fbac98a054c39edd
SHA5129b18aca25563f0dd6e20c3deb41834b55d5455dde7ef802b291e95475d23c99a1f8f5c0d0b227028f578610292b3ba4ff0b528785cec821af2daf4fa93ea6d13
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
e5509d55d22e60402457e60be6ed85ce
SHA1762d6334e098d9cbd028e7f2a83c0d77ff2c2086
SHA2560c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9
SHA51221bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed
-
MD5
e5509d55d22e60402457e60be6ed85ce
SHA1762d6334e098d9cbd028e7f2a83c0d77ff2c2086
SHA2560c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9
SHA51221bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed
-
MD5
af706e535a57ea4a789f311567870803
SHA13578e1893aee7f4e9cdd1dcf0f8d9292804b21ca
SHA256c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b
SHA5125545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333
-
MD5
af706e535a57ea4a789f311567870803
SHA13578e1893aee7f4e9cdd1dcf0f8d9292804b21ca
SHA256c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b
SHA5125545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
1add1cd4f3138cdc7dc07cbbe49a765c
SHA141e417f3c306ed435144ba4539424e977f5f09e7
SHA256b6ff6028464839c63f6bb6a1e66574382b0d89d022ee975a119d0791fd82f1a2
SHA512d49297471a84bab8783e93e8d9dfeb27241f13ae9c74c4cd22e112454e42f5c7d22f5ad46c06c4dba41b74bd91dee4c1330c52f5158a20aca98ef6a82f90dae5
-
MD5
1add1cd4f3138cdc7dc07cbbe49a765c
SHA141e417f3c306ed435144ba4539424e977f5f09e7
SHA256b6ff6028464839c63f6bb6a1e66574382b0d89d022ee975a119d0791fd82f1a2
SHA512d49297471a84bab8783e93e8d9dfeb27241f13ae9c74c4cd22e112454e42f5c7d22f5ad46c06c4dba41b74bd91dee4c1330c52f5158a20aca98ef6a82f90dae5
-
MD5
c2f1a5eae2e3d839725b5d3ec21f926d
SHA1ec5cc9453a52e46a4ca402b476ebfc480a03cbd0
SHA25627740a031a847e5a87ee023ed0f4b6ef993fe01f33c31d2a3bd40ef3cc207cbc
SHA512ffb73235b0b26d474a4216bd4fe4ead690ccde4773011c223bb86aaa8c1d4d8154c06df388f155502689e828e8dd41b9d2c284fb19bb8eef66fe23c6accd0909
-
MD5
c2f1a5eae2e3d839725b5d3ec21f926d
SHA1ec5cc9453a52e46a4ca402b476ebfc480a03cbd0
SHA25627740a031a847e5a87ee023ed0f4b6ef993fe01f33c31d2a3bd40ef3cc207cbc
SHA512ffb73235b0b26d474a4216bd4fe4ead690ccde4773011c223bb86aaa8c1d4d8154c06df388f155502689e828e8dd41b9d2c284fb19bb8eef66fe23c6accd0909
-
MD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4