Analysis
-
max time kernel
157s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 05:25
Static task
static1
Behavioral task
behavioral1
Sample
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe
Resource
win10v20210408
General
-
Target
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe
-
Size
142KB
-
MD5
f2d3cd5cd679fc9dd8e339449406abf1
-
SHA1
783c5df2051f8cc5b9817d44d0c792ccd5286710
-
SHA256
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90
-
SHA512
401b8681a14e158e184a8de8fa9e9710d7c4a1d2358ef5efe6bfb3f1052877120a896946b782abb4938ecd62f6503367e5d603387dd8c436e6f1eb392c001db4
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Extracted
redline
nn
135.181.49.56:47634
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3932-214-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3932-215-0x000000000041C5C6-mapping.dmp family_redline behavioral1/memory/3932-223-0x0000000004E40000-0x0000000005446000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid Process procid_target PID 5020 created 1988 5020 WerFault.exe 85 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x00030000000155ab-170.dat Nirsoft behavioral1/files/0x00030000000155ab-174.dat Nirsoft behavioral1/files/0x00030000000155ab-176.dat Nirsoft -
Executes dropped EXE 11 IoCs
Processes:
C569.exeCC20.exeCE44.exeD114.exeD328.exeAdvancedRun.exeAdvancedRun.exesvchost.exeeshdssesvchost.exeeshdssepid Process 2352 C569.exe 1496 CC20.exe 3144 CE44.exe 1288 D114.exe 1988 D328.exe 744 AdvancedRun.exe 3640 AdvancedRun.exe 1748 svchost.exe 4176 eshdsse 4904 svchost.exe 4420 eshdsse -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
CC20.exeC569.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CC20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CC20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C569.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C569.exe -
Deletes itself 1 IoCs
Processes:
pid Process 3000 -
Loads dropped DLL 1 IoCs
Processes:
D328.exepid Process 1988 D328.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x000400000001ab1e-119.dat themida behavioral1/files/0x000400000001ab1e-120.dat themida behavioral1/files/0x000200000001ab1f-123.dat themida behavioral1/files/0x000200000001ab1f-124.dat themida behavioral1/memory/2352-129-0x0000000000D90000-0x0000000000D91000-memory.dmp themida behavioral1/memory/1496-135-0x0000000000180000-0x0000000000181000-memory.dmp themida -
Processes:
CE44.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\CE44.exe = "0" CE44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" CE44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" CE44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features CE44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths CE44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions CE44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection CE44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" CE44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet CE44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" CE44.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
D114.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\svchost.exe\" -start" D114.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run D114.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
C569.exeCC20.exeCE44.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C569.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CC20.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CE44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CE44.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc Process File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\V: svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
C569.exeCC20.exepid Process 2352 C569.exe 1496 CC20.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exeCE44.exeeshdssedescription pid Process procid_target PID 3920 set thread context of 2152 3920 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 77 PID 3144 set thread context of 3932 3144 CE44.exe 106 PID 4176 set thread context of 4420 4176 eshdsse 141 -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ppd.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL078.XML svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-ppd.xrm-ms svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_zh_CN.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-sendopts_zh_CN.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Retail-pl.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-180.png.payfast290.271-848-962 svchost.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp-ul-oob.xrm-ms svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-attach_ja.jar svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-oob.xrm-ms svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\eclipse.inf.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-favorites.jar svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Trial-ul-oob.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jmx.xml svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvm.xml svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-ul-oob.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ul-phn.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019MSDNR_Retail-pl.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.di_1.0.0.v20140328-2112.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-loaders_ja.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-filesystems.xml svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-100.png svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Consolas-Verdana.xml.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_OEM_Perp-ul-oob.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Trial-ul-oob.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTrial-ppd.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\Bibliography\BIBFORM.XML svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-utilities_ja.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\access-bridge-64.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ppd.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-snaptracer.xml.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ul-oob.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Trial-pl.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe.manifest svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsym.ttf.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_ja_4.4.0.v20140623020002.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-options.xml svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_MAK_AE-ul-oob.xrm-ms svchost.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach.ja_5.5.0.165303.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_zh_CN.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\com.jrockit.mc.rcp.product_root_5.5.0.165303 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\ISO690Nmerical.XSL.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\logging.properties.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-ul-phn.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-80.png.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core_2.3.0.v20131211-1531.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-io-ui.xml.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8en.dub svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher_1.3.0.v20140415-2008.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_KMS_Automation-ul-oob.xrm-ms.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.felix.gogo.runtime_0.10.0.v201209301036.jar.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.attributeTransformation.exsd.payfast290.271-848-962 svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvmstat.xml svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp3-ppd.xrm-ms svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 3920 1988 WerFault.exe 85 1768 1988 WerFault.exe 85 4156 1988 WerFault.exe 85 4204 1988 WerFault.exe 85 4260 1988 WerFault.exe 85 4328 1988 WerFault.exe 85 4416 1988 WerFault.exe 85 4564 1988 WerFault.exe 85 4664 1988 WerFault.exe 85 5084 1988 WerFault.exe 85 4248 1988 WerFault.exe 85 4584 1988 WerFault.exe 85 4664 1988 WerFault.exe 85 5020 1988 WerFault.exe 85 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exeeshdssedescription ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eshdsse Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eshdsse Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI eshdsse Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 4128 vssadmin.exe 4668 vssadmin.exe -
Processes:
D114.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 D114.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 D114.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exepid Process 2152 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 2152 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 3000 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exeeshdssepid Process 2152 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 3000 4420 eshdsse -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeD114.exeWerFault.exeCE44.exepowershell.exepowershell.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeC569.exeCC20.exeWerFault.exengentask.exeWerFault.exeWerFault.exeWerFault.exeWMIC.exedescription pid Process Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeDebugPrivilege 744 AdvancedRun.exe Token: SeImpersonatePrivilege 744 AdvancedRun.exe Token: SeDebugPrivilege 3640 AdvancedRun.exe Token: SeImpersonatePrivilege 3640 AdvancedRun.exe Token: SeDebugPrivilege 1288 D114.exe Token: SeDebugPrivilege 1288 D114.exe Token: SeRestorePrivilege 3920 WerFault.exe Token: SeBackupPrivilege 3920 WerFault.exe Token: SeBackupPrivilege 3920 WerFault.exe Token: SeDebugPrivilege 3144 CE44.exe Token: SeDebugPrivilege 3920 WerFault.exe Token: SeDebugPrivilege 3108 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 1768 WerFault.exe Token: SeDebugPrivilege 4156 WerFault.exe Token: SeDebugPrivilege 4204 WerFault.exe Token: SeDebugPrivilege 4260 WerFault.exe Token: SeDebugPrivilege 4328 WerFault.exe Token: SeDebugPrivilege 2352 C569.exe Token: SeDebugPrivilege 1496 CC20.exe Token: SeDebugPrivilege 4416 WerFault.exe Token: SeDebugPrivilege 3932 ngentask.exe Token: SeDebugPrivilege 4564 WerFault.exe Token: SeDebugPrivilege 4664 WerFault.exe Token: SeDebugPrivilege 5084 WerFault.exe Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeShutdownPrivilege 3000 Token: SeCreatePagefilePrivilege 3000 Token: SeIncreaseQuotaPrivilege 2776 WMIC.exe Token: SeSecurityPrivilege 2776 WMIC.exe Token: SeTakeOwnershipPrivilege 2776 WMIC.exe Token: SeLoadDriverPrivilege 2776 WMIC.exe Token: SeSystemProfilePrivilege 2776 WMIC.exe Token: SeSystemtimePrivilege 2776 WMIC.exe Token: SeProfSingleProcessPrivilege 2776 WMIC.exe Token: SeIncBasePriorityPrivilege 2776 WMIC.exe Token: SeCreatePagefilePrivilege 2776 WMIC.exe Token: SeBackupPrivilege 2776 WMIC.exe Token: SeRestorePrivilege 2776 WMIC.exe Token: SeShutdownPrivilege 2776 WMIC.exe Token: SeDebugPrivilege 2776 WMIC.exe Token: SeSystemEnvironmentPrivilege 2776 WMIC.exe Token: SeRemoteShutdownPrivilege 2776 WMIC.exe Token: SeUndockPrivilege 2776 WMIC.exe Token: SeManageVolumePrivilege 2776 WMIC.exe Token: 33 2776 WMIC.exe Token: 34 2776 WMIC.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3000 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exeCE44.exeAdvancedRun.exeD114.exedescription pid Process procid_target PID 3920 wrote to memory of 2152 3920 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 77 PID 3920 wrote to memory of 2152 3920 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 77 PID 3920 wrote to memory of 2152 3920 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 77 PID 3920 wrote to memory of 2152 3920 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 77 PID 3920 wrote to memory of 2152 3920 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 77 PID 3920 wrote to memory of 2152 3920 df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe 77 PID 3000 wrote to memory of 2352 3000 79 PID 3000 wrote to memory of 2352 3000 79 PID 3000 wrote to memory of 2352 3000 79 PID 3000 wrote to memory of 1496 3000 81 PID 3000 wrote to memory of 1496 3000 81 PID 3000 wrote to memory of 1496 3000 81 PID 3000 wrote to memory of 3144 3000 83 PID 3000 wrote to memory of 3144 3000 83 PID 3000 wrote to memory of 3144 3000 83 PID 3000 wrote to memory of 1288 3000 84 PID 3000 wrote to memory of 1288 3000 84 PID 3000 wrote to memory of 1288 3000 84 PID 3000 wrote to memory of 1988 3000 85 PID 3000 wrote to memory of 1988 3000 85 PID 3000 wrote to memory of 1988 3000 85 PID 3000 wrote to memory of 2328 3000 86 PID 3000 wrote to memory of 2328 3000 86 PID 3000 wrote to memory of 2328 3000 86 PID 3000 wrote to memory of 2328 3000 86 PID 3000 wrote to memory of 1832 3000 87 PID 3000 wrote to memory of 1832 3000 87 PID 3000 wrote to memory of 1832 3000 87 PID 3000 wrote to memory of 2248 3000 88 PID 3000 wrote to memory of 2248 3000 88 PID 3000 wrote to memory of 2248 3000 88 PID 3000 wrote to memory of 2248 3000 88 PID 3144 wrote to memory of 744 3144 CE44.exe 89 PID 3144 wrote to memory of 744 3144 CE44.exe 89 PID 3144 wrote to memory of 744 3144 CE44.exe 89 PID 3000 wrote to memory of 200 3000 90 PID 3000 wrote to memory of 200 3000 90 PID 3000 wrote to memory of 200 3000 90 PID 744 wrote to memory of 3640 744 AdvancedRun.exe 91 PID 744 wrote to memory of 3640 744 AdvancedRun.exe 91 PID 744 wrote to memory of 3640 744 AdvancedRun.exe 91 PID 3000 wrote to memory of 3444 3000 93 PID 3000 wrote to memory of 3444 3000 93 PID 3000 wrote to memory of 3444 3000 93 PID 3000 wrote to memory of 3444 3000 93 PID 3000 wrote to memory of 3928 3000 94 PID 3000 wrote to memory of 3928 3000 94 PID 3000 wrote to memory of 3928 3000 94 PID 3000 wrote to memory of 1428 3000 95 PID 3000 wrote to memory of 1428 3000 95 PID 3000 wrote to memory of 1428 3000 95 PID 3000 wrote to memory of 1428 3000 95 PID 1288 wrote to memory of 1748 1288 D114.exe 98 PID 1288 wrote to memory of 1748 1288 D114.exe 98 PID 1288 wrote to memory of 1748 1288 D114.exe 98 PID 1288 wrote to memory of 3644 1288 D114.exe 99 PID 1288 wrote to memory of 3644 1288 D114.exe 99 PID 1288 wrote to memory of 3644 1288 D114.exe 99 PID 1288 wrote to memory of 3644 1288 D114.exe 99 PID 1288 wrote to memory of 3644 1288 D114.exe 99 PID 1288 wrote to memory of 3644 1288 D114.exe 99 PID 3000 wrote to memory of 2584 3000 100 PID 3000 wrote to memory of 2584 3000 100 PID 3000 wrote to memory of 2584 3000 100 -
System policy modification 1 TTPs 1 IoCs
Processes:
CE44.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CE44.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe"C:\Users\Admin\AppData\Local\Temp\df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe"C:\Users\Admin\AppData\Local\Temp\df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\C569.exeC:\Users\Admin\AppData\Local\Temp\C569.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
C:\Users\Admin\AppData\Local\Temp\CC20.exeC:\Users\Admin\AppData\Local\Temp\CC20.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
C:\Users\Admin\AppData\Local\Temp\CE44.exeC:\Users\Admin\AppData\Local\Temp\CE44.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\27f3bbcd-877a-4608-80b2-a098046745f9\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\27f3bbcd-877a-4608-80b2-a098046745f9\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\27f3bbcd-877a-4608-80b2-a098046745f9\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\27f3bbcd-877a-4608-80b2-a098046745f9\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\27f3bbcd-877a-4608-80b2-a098046745f9\AdvancedRun.exe" /SpecialRun 4101d8 7443⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CE44.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CE44.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\D114.exeC:\Users\Admin\AppData\Local\Temp\D114.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:4692
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:4708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:4740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:4828
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4128
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:4864
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:4576
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:4772
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\D328.exeC:\Users\Admin\AppData\Local\Temp\D328.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7362⤵
- Drops file in Windows directory
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7522⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 8802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 11882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 12442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 12602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 12442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 12882⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 13642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 14362⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 14722⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 14002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 14322⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2328
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1832
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2248
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:200
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3444
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3928
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1428
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2584
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1544
-
C:\Users\Admin\AppData\Roaming\eshdsseC:\Users\Admin\AppData\Roaming\eshdsse1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4176 -
C:\Users\Admin\AppData\Roaming\eshdsseC:\Users\Admin\AppData\Roaming\eshdsse2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4420
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4280
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Install Root Certificate
1Modify Registry
7Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD55703edef7cb0f99305a6b18845e0443e
SHA1fb6f022ebde210306e1a6575462d6451e98af454
SHA256e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883
SHA5124631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD5888f7457c332ac5e1897316e159f58c1
SHA1a3047c6e978158dfae29b5735e8131ec1b30703d
SHA256c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41
SHA5120abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5939460925953ce88e1086341b8a11bda
SHA106249b891050a9fac128ccfee943aeb5bede1c7b
SHA256d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016
SHA512a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
MD505cdaaf3b38147e216b64bf35f4304e1
SHA1c81d01f43c333314041b53f6c4dd956b1096eca3
SHA25659ed0f0f6515936c91f20c8d5d6bd73cacb4564d325dca82b0c2114770a25f41
SHA51227bec19840ea137718de94525338772fdf360112ab6bd66e1c006938a6453ef61d0f72c330a818216cc196f5fc85b307d969b91100bfaa97b80a0b085f02af8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
MD508bd65aab995c11e57b80d5aa81df199
SHA1987d6f7a9fd7d69541cef045bfe1d628d4a6acae
SHA2560506b8e33bdca805c632ea179c22d0b19cb8ee461556d21b0dbb02885c9092f3
SHA5127532d6dadcf46b15fa716d3efc896fe0f81c99fbe1bd77a4f0859870f25d23fa5fd5965e1f8d89152814423cfe2f46bb9ae643024b290128f7dd7861d731406b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD597bce9b239603ca1f27a250d8db91c67
SHA10a4f0ac1579c02971560f432c3369ed07b02afbe
SHA2562bee8508730a5223f7d3f4f0d9d80841a1162429d52f8b879b6a2f032a1a978b
SHA512831c2e07a672ff2e314b7f610031b94b8b76580d39c8de0b4b8c7902c708f476b5b8c38612d877ef54a3fdcd57ca20ac89666f89e2843e0089f4cf6e2e6d60d3
-
MD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
MD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
MD5
a356bda3a1e829f1009296d409a9419a
SHA1a59f54c6012f60c8fe45b65811681881dadc50e7
SHA2562b65e8550c2400e8fb376883e1ff435f22d7a0f7c2aa982a485f506489a04bc1
SHA512cf4a472daee772513799d6e88c3ff193698aae648ac62fbc0f2bacbe4d03d29aee53b122d6cb353a5c88d34bf87a26771f3b538d5da05b19cbae91b9bd88e015
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
f2d3cd5cd679fc9dd8e339449406abf1
SHA1783c5df2051f8cc5b9817d44d0c792ccd5286710
SHA256df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90
SHA512401b8681a14e158e184a8de8fa9e9710d7c4a1d2358ef5efe6bfb3f1052877120a896946b782abb4938ecd62f6503367e5d603387dd8c436e6f1eb392c001db4
-
MD5
f2d3cd5cd679fc9dd8e339449406abf1
SHA1783c5df2051f8cc5b9817d44d0c792ccd5286710
SHA256df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90
SHA512401b8681a14e158e184a8de8fa9e9710d7c4a1d2358ef5efe6bfb3f1052877120a896946b782abb4938ecd62f6503367e5d603387dd8c436e6f1eb392c001db4
-
MD5
f2d3cd5cd679fc9dd8e339449406abf1
SHA1783c5df2051f8cc5b9817d44d0c792ccd5286710
SHA256df21b56dcc8d953c204f3fada671f0b7bc6a03fd53cfd19409ad36d4f00d8b90
SHA512401b8681a14e158e184a8de8fa9e9710d7c4a1d2358ef5efe6bfb3f1052877120a896946b782abb4938ecd62f6503367e5d603387dd8c436e6f1eb392c001db4
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4