Resubmissions
20-03-2022 09:45
220320-lref4sbghm 1020-03-2022 08:52
220320-ks5t1sbca7 1020-03-2022 07:17
220320-h4fyxsaee6 1020-03-2022 06:45
220320-hjkrdaabg5 10Analysis
-
max time kernel
2110s -
max time network
2019s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
20-03-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
13160edab74cc2dd34653920d4bf56e487fea2fd6adf8249e0be9215ced902b4.pdf
Resource
win10-20220310-en
General
-
Target
13160edab74cc2dd34653920d4bf56e487fea2fd6adf8249e0be9215ced902b4.pdf
-
Size
2.6MB
-
MD5
7f6060451f81564336bd5d9e5c95797a
-
SHA1
70c756af084d013e703d5e1c0f561eea6cb2f781
-
SHA256
13160edab74cc2dd34653920d4bf56e487fea2fd6adf8249e0be9215ced902b4
-
SHA512
c5263836ef7264e48e4166042827340244fe430b490ad41acde7fef378757731e7d3fecfe05c5d75695d32dcba7a13db86bea36366c5f4fb1e0ea3e321032abf
Malware Config
Extracted
C:\Users\Admin\Desktop\sample.txt
ryuk
https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread","threat_level_id":3,"kb_article_link":null,"coverage":null,"updated_on":"2021-09-22T21:08:45.000Z","external_analysis":{"links":["https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread"]},"is_coat":0,"created_on":"2021-09-22T21:08:45.000Z"}]},{"id":"55424f67-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/","threat_level_id":2,"kb_article_link":null,"coverage":null,"updated_on":"2021-07-16T21:00:52.000Z","external_analysis":{"links":["https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/","https://www.cadosecurity.com/post/triage-analysis-of-serv-u-ftp-user-backdoor-deployed-by-cve-2021-35211","https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211"]},"is_coat":0,"created_on":"2021-07-16T21:00:52.000Z"}]},{"id":"55521ab5-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
https://www.trellix.com/en-gb/about/newsroom/stories/threat-labs/prime-ministers-office-compromised.html","threat_level_id":1,"kb_article_link":null,"coverage":{"dat_version":{"min":4695}},"updated_on":"2022-03-10T22:12:48.000Z","external_analysis":{"links":["https://www.trellix.com/en-gb/about/newsroom/stories/threat-labs/prime-ministers-office-compromised.html","https://www.trellix.com/en-gb/about/newsroom/stories/threat-labs/looking-over-the-nation-state-actors-shoulders.html"]},"is_coat":1,"created_on":"2022-01-25T16:59:37.000Z"}]},{"id":"55587287-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
https://unit42.paloaltonetworks.com/bazarloader-malware/.","threat_level_id":2,"kb_article_link":"https://kc.mcafee.com/corporate/index?page=content&id=KB95149","coverage":{"dat_version":{"min":4458}},"updated_on":"2022-02-21T18:23:50.000Z","external_analysis":{"links":["https://unit42.paloaltonetworks.com/bazarloader-malware/"]},"is_coat":1,"created_on":"2021-05-21T19:46:56.000Z"}]},{"id":"555b74bd-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
Extracted
C:\Users\Admin\Desktop\try.txt
ryuk
https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread","threat_level_id":3,"kb_article_link":null,"coverage":null,"updated_on":"2021-09-22T21:08:45.000Z","external_analysis":{"links":["https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread"]},"is_coat":0,"created_on":"2021-09-22T21:08:45.000Z"}]},{"id":"55424f67-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/","threat_level_id":2,"kb_article_link":null,"coverage":null,"updated_on":"2021-07-16T21:00:52.000Z","external_analysis":{"links":["https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/","https://www.cadosecurity.com/post/triage-analysis-of-serv-u-ftp-user-backdoor-deployed-by-cve-2021-35211","https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211"]},"is_coat":0,"created_on":"2021-07-16T21:00:52.000Z"}]},{"id":"55521ab5-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
https://www.trellix.com/en-gb/about/newsroom/stories/threat-labs/prime-ministers-office-compromised.html","threat_level_id":1,"kb_article_link":null,"coverage":{"dat_version":{"min":4695}},"updated_on":"2022-03-10T22:12:48.000Z","external_analysis":{"links":["https://www.trellix.com/en-gb/about/newsroom/stories/threat-labs/prime-ministers-office-compromised.html","https://www.trellix.com/en-gb/about/newsroom/stories/threat-labs/looking-over-the-nation-state-actors-shoulders.html"]},"is_coat":1,"created_on":"2022-01-25T16:59:37.000Z"}]},{"id":"55587287-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
https://unit42.paloaltonetworks.com/bazarloader-malware/.","threat_level_id":2,"kb_article_link":"https://kc.mcafee.com/corporate/index?page=content&id=KB95149","coverage":{"dat_version":{"min":4458}},"updated_on":"2022-02-21T18:23:50.000Z","external_analysis":{"links":["https://unit42.paloaltonetworks.com/bazarloader-malware/"]},"is_coat":1,"created_on":"2021-05-21T19:46:56.000Z"}]},{"id":"555b74bd-afc2-11eb-9d72-02d538d9640e","type":"yara","category":"Artifacts
https://unit42.paloaltonetworks.com/bazarloader-malware/.","threat_level_id":2,"kb_article_link":"https://kc.mcafee.com/corporate/index?page=content&id=KB95149","coverage":{"dat_version":{"min":4458}},"updated_on":"2022-02-21T18:23:50.000Z","external_analysis":{"links":["https://unit42.paloaltonetworks.com/bazarloader-malware/"]},"is_coat":1,"created_on":"2021-05-21T19:46:56.000Z"}]},{"id":"556b77d0-82d6-48e3-bc24-e19274b7298a","type":"yara","category":"Payload
https://github.com/Neo23x0/signature-base/blob/master/LICENSE\"\r\n\t\tauthor
https://www.trendmicro.com/en_us/research/21/i/cryptominer-z0miner-uses-newly-discovered-vulnerability-cve-2021.html","threat_level_id":3,"kb_article_link":null,"coverage":null,"updated_on":"2021-09-23T21:08:39.000Z","external_analysis":{"links":["https://www.trendmicro.com/en_us/research/21/i/cryptominer-z0miner-uses-newly-discovered-vulnerability-cve-2021.html"]},"is_coat":0,"created_on":"2021-09-23T05:08:48.000Z"}]},{"id":"5572c500-4fb6-4ecf-b438-558cefa2a0f1","type":"yara","category":"Payload
https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/","threat_level_id":2,"kb_article_link":null,"coverage":null,"updated_on":"2021-07-30T21:00:36.000Z","external_analysis":{"links":["https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/","https://github.com/craiu/iocs/blob/main/lemonduck/hashes.txt","https://www.microsoft.com/security/blog/2021/07/29/when-coin-miners-evolve-part-2-hunting-down-lemonduck-and-lemoncat-attacks/"]},"is_coat":0,"created_on":"2021-07-28T21:00:44.000Z"}]},{"id":"5600d974-8c73-4140-895d-664d35e4d812","type":"vulnerability","category":"External
https://blog.talosintelligence.com/2021/10/crimeware-targets-afghanistan-india.html","threat_level_id":3,"kb_article_link":null,"coverage":null,"updated_on":"2021-10-20T21:08:42.000Z","external_analysis":{"links":["https://blog.talosintelligence.com/2021/10/crimeware-targets-afghanistan-india.html#more"]},"is_coat":0,"created_on":"2021-10-20T21:08:42.000Z"}]},{"id":"5619e328-4e9c-4ed5-a95a-d627e0def0eb","type":"command-line","category":"Other","value":"\"CSIDL_SYSTEM\\wscript.exe\"
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine","threat_level_id":2,"kb_article_link":null,"coverage":null,"updated_on":"2022-03-10T20:06:17.000Z","external_analysis":{"links":["https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine"]},"is_coat":0,"created_on":"2022-02-01T06:14:49.000Z"}]},{"id":"56223e89-06ec-40a4-a152-24e10b3bbe8e","type":"command-line","category":"Other","value":"curl
http://45.9.148[.]182/bin/bot/chimera.cc
https://www.uptycs.com/blog/team-tnt-deploys-malicious-docker-image-on-docker-hub-with-pentesting-tools","threat_level_id":3,"kb_article_link":null,"coverage":null,"updated_on":"2021-10-19T21:08:39.000Z","external_analysis":{"links":["https://www.uptycs.com/blog/team-tnt-deploys-malicious-docker-image-on-docker-hub-with-pentesting-tools","https://securityaffairs.co/wordpress/123535/cyber-crime/teamtnt-docker-attack.html"]},"is_coat":0,"created_on":"2021-10-08T21:08:42.000Z"}]},{"id":"5625cca8-c8ea-4a20-8770-2cd1da012ec9","type":"yara","category":"Payload
https://www.manageengine.com/data-security/how-to/how-to-detect-ransomware-attacks.html\nlogsource:\n
https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment\n
https://blog.talosintelligence.com/2017/05/wannacry.html\n
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/new-teslacrypt-ransomware-arrives-via-spam/\n
https://www.bleepingcomputer.com/news/security/why-everyone-should-disable-vssadmin-exe-now/\n
https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100\n
https://github.com/Neo23x0/Raccine#the-process\n
https://github.com/Neo23x0/Raccine/blob/main/yara/gen_ransomware_command_lines.yar\ntags:\n
https://decoded.avast.io/anhho/blustealer/","threat_level_id":2,"kb_article_link":"https://kc.mcafee.com/corporate/index?page=content&id=KB95191","coverage":{"dat_version":{"min":4582}},"updated_on":"2022-02-21T19:15:54.000Z","external_analysis":{"links":["https://decoded.avast.io/anhho/blustealer/"]},"is_coat":1,"created_on":"2021-09-23T21:08:42.000Z"}]},{"id":"5648773d-ce03-4ff6-8065-824153ab8dae","type":"vulnerability","category":"External
https://unit42.paloaltonetworks.com/sockdetour/","threat_level_id":2,"kb_article_link":null,"coverage":null,"updated_on":"2022-03-16T11:37:40.000Z","external_analysis":{"links":["https://unit42.paloaltonetworks.com/sockdetour/"]},"is_coat":1,"created_on":"2022-02-25T06:12:05.000Z"}]},{"id":"564c3854-5a70-4a6b-a659-c409bbdcd96a","type":"sigma","category":"Payload
https://www.hybrid-analysis.com/sample/759fb4c0091a78c5ee035715afe3084686a8493f39014aea72dae36869de9ff6?environmentId=100\r\nauthor
https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/","threat_level_id":2,"kb_article_link":null,"coverage":null,"updated_on":"2021-10-04T21:08:42.000Z","external_analysis":{"links":["https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/"]},"is_coat":0,"created_on":"2021-10-04T21:08:42.000Z"}]},{"id":"5665bbd5-45bf-447a-8fa5-09101fe3ad10","type":"command-line","category":"Other","value":"cmd
https://blogs.vmware.com/networkvirtualization/2022/01/emotet-is-not-dead-yet.html/","threat_level_id":2,"kb_article_link":null,"coverage":{"dat_version":{"min":4706}},"updated_on":"2022-02-24T17:21:43.000Z","external_analysis":{"links":["https://blogs.vmware.com/networkvirtualization/2022/01/emotet-is-not-dead-yet.html/"]},"is_coat":1,"created_on":"2022-02-17T22:13:42.000Z"}]},{"id":"5683dc9a-1bd6-42e0-ba0f-48545f63ac92","type":"sigma","category":"Payload
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222/T1222.yaml\nauthor
https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/","threat_level_id":2,"kb_article_link":null,"coverage":{"dat_version":{"min":4687}},"updated_on":"2022-03-09T12:19:32.000Z","external_analysis":{"links":["https://securelist.com/the-bluenoroff-cryptocurrency-hunt-is-still-on/105488/"]},"is_coa
Extracted
C:\Users\Admin\AppData\Local\Temp\708_264607501\english_wikipedia.txt
prometheus
https
http
Signatures
-
Prometheus Ransomware
Ransomware family mostly targeting manufacturing industry and claims to be affiliated with REvil.
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 4 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 2272 software_reporter_tool.exe 3896 software_reporter_tool.exe 5024 software_reporter_tool.exe 3120 software_reporter_tool.exe -
Loads dropped DLL 7 IoCs
Processes:
software_reporter_tool.exepid process 5024 software_reporter_tool.exe 5024 software_reporter_tool.exe 5024 software_reporter_tool.exe 5024 software_reporter_tool.exe 5024 software_reporter_tool.exe 5024 software_reporter_tool.exe 5024 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
OpenWith.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri OpenWith.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
chrome.exechrome.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 34 IoCs
Processes:
NOTEPAD.EXEfirefox.exeOpenWith.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "3" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-370654639-3807403165-1443644579-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NOTEPAD.EXE -
Opens file in notepad (likely ransom note) 5 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXENOTEPAD.EXENOTEPAD.EXENOTEPAD.EXEpid process 4160 NOTEPAD.EXE 3872 NOTEPAD.EXE 1352 NOTEPAD.EXE 2324 NOTEPAD.EXE 4228 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exesoftware_reporter_tool.exepid process 956 chrome.exe 956 chrome.exe 4432 chrome.exe 4432 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 600 chrome.exe 4524 chrome.exe 4524 chrome.exe 4412 chrome.exe 4412 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 5104 chrome.exe 5104 chrome.exe 708 chrome.exe 708 chrome.exe 2868 chrome.exe 2868 chrome.exe 2500 chrome.exe 2500 chrome.exe 4512 chrome.exe 4512 chrome.exe 1564 chrome.exe 1564 chrome.exe 1564 chrome.exe 1564 chrome.exe 2264 chrome.exe 2264 chrome.exe 2272 software_reporter_tool.exe 2272 software_reporter_tool.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 4960 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
Processes:
chrome.exechrome.exechrome.exepid process 4432 chrome.exe 4432 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
firefox.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exedescription pid process Token: SeDebugPrivilege 4528 firefox.exe Token: SeDebugPrivilege 4528 firefox.exe Token: 33 3896 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3896 software_reporter_tool.exe Token: 33 2272 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2272 software_reporter_tool.exe Token: 33 5024 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 5024 software_reporter_tool.exe Token: 33 3120 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3120 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exechrome.exechrome.exechrome.exepid process 4528 firefox.exe 4528 firefox.exe 4528 firefox.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4528 firefox.exe 4528 firefox.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
firefox.exechrome.exechrome.exechrome.exepid process 4528 firefox.exe 4528 firefox.exe 4528 firefox.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe 708 chrome.exe -
Suspicious use of SetWindowsHookEx 58 IoCs
Processes:
AcroRd32.exeOpenWith.exeNOTEPAD.EXEfirefox.exepid process 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 4960 OpenWith.exe 3872 NOTEPAD.EXE 4528 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4004 wrote to memory of 1220 4004 AcroRd32.exe RdrCEF.exe PID 4004 wrote to memory of 1220 4004 AcroRd32.exe RdrCEF.exe PID 4004 wrote to memory of 1220 4004 AcroRd32.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2720 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe PID 1220 wrote to memory of 2732 1220 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\13160edab74cc2dd34653920d4bf56e487fea2fd6adf8249e0be9215ced902b4.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0880D8DD15A2217992F11FC1BD39F2F4 --mojo-platform-channel-handle=1608 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2720
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E29B4D263A25EF8240A244D05A666879 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E29B4D263A25EF8240A244D05A666879 --renderer-client-id=2 --mojo-platform-channel-handle=1624 --allow-no-sandbox-job /prefetch:13⤵PID:2732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BBB4BD5E785EE6CB064012B5ED52C4D9 --mojo-platform-channel-handle=2192 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1440
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=79EA89AD0BE93D442245E6C10FA295BE --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2036
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F5F513C487D237090281A1C5EEA45221 --mojo-platform-channel-handle=2168 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:196
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1504
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\13160edab74cc2dd34653920d4bf56e487fea2fd6adf8249e0be9215ced902b4.pdf2⤵
- Opens file in notepad (likely ransom note)
PID:4160
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\sample.txt1⤵
- Modifies registry class
- Opens file in notepad (likely ransom note)
- Suspicious use of SetWindowsHookEx
PID:3872
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:4384
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4528 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4528.0.1649647212\653760035" -parentBuildID 20200403170909 -prefsHandle 1508 -prefMapHandle 1500 -prefsLen 1 -prefMapSize 219609 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4528 "\\.\pipe\gecko-crash-server-pipe.4528" 1600 gpu3⤵PID:652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4528.3.1759880625\82505900" -childID 1 -isForBrowser -prefsHandle 2132 -prefMapHandle 2124 -prefsLen 122 -prefMapSize 219609 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4528 "\\.\pipe\gecko-crash-server-pipe.4528" 2260 tab3⤵PID:512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4528.13.251116746\6877299" -childID 2 -isForBrowser -prefsHandle 2952 -prefMapHandle 2168 -prefsLen 989 -prefMapSize 219609 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4528 "\\.\pipe\gecko-crash-server-pipe.4528" 2216 tab3⤵PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4528.20.1811639624\1820086767" -childID 3 -isForBrowser -prefsHandle 2880 -prefMapHandle 2712 -prefsLen 6986 -prefMapSize 219609 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4528 "\\.\pipe\gecko-crash-server-pipe.4528" 3156 tab3⤵PID:5100
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffa0ec4f50,0x7fffa0ec4f60,0x7fffa0ec4f702⤵
- Suspicious behavior: EnumeratesProcesses
PID:600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1432,15132510748626480425,7950037295553823401,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1616 /prefetch:22⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1432,15132510748626480425,7950037295553823401,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1432,15132510748626480425,7950037295553823401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1432,15132510748626480425,7950037295553823401,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:12⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1432,15132510748626480425,7950037295553823401,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1432,15132510748626480425,7950037295553823401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4000 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffa0ec4f50,0x7fffa0ec4f60,0x7fffa0ec4f702⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1508,16274327117952076572,14971062182570068791,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1524 /prefetch:22⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1508,16274327117952076572,14971062182570068791,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1508,16274327117952076572,14971062182570068791,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1508,16274327117952076572,14971062182570068791,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1508,16274327117952076572,14971062182570068791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1508,16274327117952076572,14971062182570068791,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1508,16274327117952076572,14971062182570068791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3704 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7fffa0ec4f50,0x7fffa0ec4f60,0x7fffa0ec4f702⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2368 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2632 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1508 /prefetch:22⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4344 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4380 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1272 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3820 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=908 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:12⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3260 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=6do6y7sgCX4f8qFjZfUP83+cM7GSjzxXS0CD01L+ --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=NewCleanerUIExperiment2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff796c425a0,0x7ff796c425b0,0x7ff796c425c03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2272_FNSGDOUITAOXDOQT" --sandboxed-process-id=2 --init-done-notifier=704 --sandbox-mojo-pipe-token=12860633025516733839 --mojo-platform-channel-handle=680 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2272_FNSGDOUITAOXDOQT" --sandboxed-process-id=3 --init-done-notifier=928 --sandbox-mojo-pipe-token=4116085108917020340 --mojo-platform-channel-handle=9243⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4436 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4352 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1588 /prefetch:12⤵PID:496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1512,15815553939645183214,14158396864184705328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1944
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\sample.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1352
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\13160edab74cc2dd34653920d4bf56e487fea2fd6adf8249e0be9215ced902b4.pdf1⤵
- Opens file in notepad (likely ransom note)
PID:2324
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\try.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD54382323e49a399df1a86c33dd80dde8a
SHA1a683c0480c58525bc6112fee226a9a2d17c30e8f
SHA2567a2d5775cb5ef12ea17ac76adb443d5e089c67812ddf87de9939c68ff34673db
SHA512eda7338a5585b6350e2a1dc9db8b62cc124249abae4a1fab50e27b91655f094cb7121456780ba3357360edbf07e296b886badac7e354ad6cebfd302ec672dc4d
-
Filesize
212B
MD5bca06d3d55ac193440e8a870bf81fde6
SHA17bd0f7c51528b6201ba4d74d1115ea21d3753cfd
SHA256a8afd6211eb0ce36bd06b254f6e91e7dc53b34db3de59723d35691cc585464ab
SHA5125b9af2afbf5dac1a398d8b4cd24b96d1ade890113ee2ed3de7f60b9cdfffb1d17debfad9865ef2a0698ad12b433734b692c0cd4fbd18fc6e8a213b10949c70ce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\367b1b12-be49-4a1d-9a69-5b64b9f7205c.dmp
Filesize1.1MB
MD58dfa7cf4914876261c9cb50eaaddc26d
SHA1d939ec354bd962fd87080a2c040df3370cb34aa8
SHA25676421bf8f112b92a16ea7711693d2bb5b275866a8dbee976faae6178a6c860ba
SHA512805c8e9a3261e5631ff320b4b8b23ab725a487c73796dd6b5ad10b71b04ce0c969e48919ae31be9787db4eef9eaa3616c52b05634993d3081115ab2f9291c508
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\3b1cdf12-6cf3-4ade-8e64-d61138e281c5.dmp
Filesize1.1MB
MD511fb0a9c20089fc3b2cb938b6254d453
SHA16b15d5d56a4d439e3cd6dfc526e747d6018f9863
SHA256afe45209ecf16f7d4d00c90349d82794d9e23265cd6d2f91491bb7a8adc96c0a
SHA51203efb612d47f2cb5f05abd034aecf56b37fde5367e6f257003f85a4a4859768b0f722765de290fff3c540ceb4e8dea291ad05e7dd5008602f0c26d5df8e38e7f
-
Filesize
40B
MD595ed7f7737fe8914d7d6aab15b04cda8
SHA13b23a923f9c3c0bf7df0199a415bda065676021d
SHA256834f215f4568d53260e783c7aeecf3b08c6d72a976c46c85c7c33427f5dab4b6
SHA5125157f84442aee11509f6ac678db815430fc0c2a5012890d5dc3e18b16c7008a6a8e9dddb27df494995258467707233504f4e54298f3a23ce8872e6d7c2992ca1
-
Filesize
40B
MD595ed7f7737fe8914d7d6aab15b04cda8
SHA13b23a923f9c3c0bf7df0199a415bda065676021d
SHA256834f215f4568d53260e783c7aeecf3b08c6d72a976c46c85c7c33427f5dab4b6
SHA5125157f84442aee11509f6ac678db815430fc0c2a5012890d5dc3e18b16c7008a6a8e9dddb27df494995258467707233504f4e54298f3a23ce8872e6d7c2992ca1
-
Filesize
44KB
MD5b0d444f6d3707f94bceb4cb872074b69
SHA14ed827dcd19c6bc25789e46a86d271c5b90662f3
SHA2562d467ea7f172d2c81d5f260fbea7fc048069737ae69263ada224f606e728facc
SHA5125bca63a9b535f5cb301289aad7214eb4e71769cf1093629e63e5f92b317fcdcdbc7c1ae6c3277118da538b9c5a3e5ea7a7eb1f760d3aeb70037ae64a4aa986c9
-
Filesize
264KB
MD52072bb58807c0ba30eb1e58c5f31f92b
SHA18d3b3e25f7e4fc64c26889b1604829eb88758308
SHA2560d1ee5bfb9e068f5e6632882407757d978b7d165bf82792fefee8251ac1ecd32
SHA5123d6b851a36fda21844c195d97700dcffaaf210a8d851fffa486b7722290137a4aeac94ad097d51f2bb97452ed6eb6dab3440d74f98748d77ae9154ec2d826292
-
Filesize
4.0MB
MD56b782c24f0d9b4662af816ed5c4041bf
SHA1bb51739ca7d9d56d34f5826e98857ce144c3be10
SHA256bb7990748b25c8dd473f41473bb81e575c4db1c27436bfbd427989ce50f62603
SHA51226780330339d2567cf62d0d7c950fb5f0c815433506608554c5365d71622ae031ced37f4f882d6af39a77bcca228aca34b00ee46d409654e46e4c64137290e33
-
Filesize
103KB
MD59542e5135791e506bf917f6b72f7ed2e
SHA1ea14be1cc424a03691d64aadd578477e40a06d27
SHA2564e20cde0981130378f932dbd68e84bc400a97f59c212d5dddcae26344c8fff20
SHA51269cfc0d85d2be56748b6669b48db5bd20b95a590a7e4681a267ca230f723b39689f3505592b7dc15730ed848c2779457fefd51fed325b15934577d9ab83d150a
-
Filesize
329B
MD52faa8fe7ba6173d0decd86b927e7bb44
SHA105d9dcbf961a58bda33dc929e1adf3a6b7251c32
SHA2565ceb6a1a3ef657bb8ebff2ce0819a5979864eb9edf88c50d5edd8ec95310ca0c
SHA51244940d16a5175d3e80061974125acdf9321458c4aee3f6b820a9c31c8adc6afa67729048dcc0501c5cabc274ce546b009dde1fdfece4fdad3323a5ea8e3cea79
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
334B
MD5dbb5886ae923da298ae9565c52eec95a
SHA1c75fb8ea383c8fbf95c3c522218236e62c0ea1c4
SHA256638539820858f0318eb042b14f7de984026823cf88e232ffac654a7747f302f5
SHA512170af048aa6433d3660e635881a3ffe9a2c0d03707ed892af56dcddcb695f3edcdc65482bd92ff8c4943bedacb6516123c9680491abc1414bec7a9796b3a9cfa
-
Filesize
5KB
MD58a2b85f75a1fe9383fca21d8c0a877a2
SHA1458d9fdec979d2a3c8b9f99a33027f747f6aee9f
SHA2561fd2c857e2646b6d236d66f2fc24fc8ee2c24da3ff52c828f0d74bafbb6b5393
SHA5127f224beb284b33b03a3c4409a45273999dfe12dc1987954c1ef5d1a2a2a0357d3e21e745439d4a15891821c98c4cbcb4ea42cfbb8fa362381a57f6bdb140ba42
-
Filesize
5KB
MD562b1d2e3db7fb64256398bc5c7666155
SHA1b6cfd9311bbdc82c62c7843a0a137000dab3f8f3
SHA256608d9c840a60e4f2f4adb244da9744a704ea0d1d60224148af7327f6767e1760
SHA512e269f62e5800a0c38139f346998d2ba3bf8f822794dc85e23f3ffb9005742927012b7563c41a5be07da0dcfae19075e52151305bcf0c08df70d102fe525e5c58
-
Filesize
363B
MD553ff6a0b4bee8468b9acc994b5d136e1
SHA1a3bc126b51d6f513b7935e8ca0d4a039bf6c5ea0
SHA256a217df08051d0cbe4569fc70efd1ccf650fd0dd3c70da0443de19fe91bf6f87e
SHA5126b3958c676606ce6115d0e21362227894daf0ac7685cd3dacd03186be257354cadb63c280e6346e4150ebb78a70c29a1939baa1afaff985906ac91fd61eb1c28
-
Filesize
1KB
MD5a476c99b207cd9a7231a81ba4f1f69db
SHA17160b4d55740135e65fadc99094e9d3451c16a25
SHA25693aa8debf6d1240554c740fda4b2c7e0b8e69bffe90118076b94a5663ff00fb9
SHA512266155638a164ffa64102e011292c156850aeca8dafcf0f00ea11a8c1a17b905e47822fd093b3033f58a115ab9643e477eb2e78b5d00b7a40a680ca9046a0f89
-
Filesize
669B
MD52a6a31844ab7f5c3760e8bf98aca4eb2
SHA1b7b3ca18fe75e6f5a342c59eda60a8dc89f299c0
SHA2565e589a41623f7e4a2cbb211d3579a67f79b4bdb3a93252702bee28b1e178cbb5
SHA51210fad5c1683cbb3173ab88fa30085e84785002ace08f3244d8ce25de87b3bacbb4638f709138bdd2ea51aae8fe77127507367cab5f325db32437a63f5f5ed63e
-
Filesize
669B
MD52a6a31844ab7f5c3760e8bf98aca4eb2
SHA1b7b3ca18fe75e6f5a342c59eda60a8dc89f299c0
SHA2565e589a41623f7e4a2cbb211d3579a67f79b4bdb3a93252702bee28b1e178cbb5
SHA51210fad5c1683cbb3173ab88fa30085e84785002ace08f3244d8ce25de87b3bacbb4638f709138bdd2ea51aae8fe77127507367cab5f325db32437a63f5f5ed63e
-
Filesize
348B
MD5e1c8bc8cc6b9250d03fed9572da698c2
SHA19af5cb85cf2206b45d25097549f5eb52159118c7
SHA256ac489987d8c11311bec5f79f6019124fd220feea3d52302e49165d7858a8228b
SHA512fdfd4fbeabc3fe39635b3aad2b9cdf46d8b090096aa3da5bf1f2cc55990b2a4f60220b2679f459f58cbcdc40efcb325ed9494ea7e0237c313bd12f3b86090630
-
Filesize
348B
MD5017fea37a23b7d44d6e50232b8de95ac
SHA19de88bd9223e9bf8846234ca3e262147d26aabcb
SHA2565a79b40fb730381330913aaedd33912ab1a800a40abec8f953cea730218a16cd
SHA512439d6ed1615cf785402efa73b398e1155cc56f0daa56fb50e77dc71630b5abac59a5cf0afc3f9d03d4bcbec3457d1b0154652240eea92a128c10b64ff935a1fc
-
Filesize
160B
MD5de92ad90be6d3364745b2f73f4c3cf73
SHA19158681463bd30e5af4dda4baac81f93cedbda77
SHA2560025a3e0d3b834401b3b5f820e1991ef7e810d9a4b8b6b579e6301c94e7031a0
SHA5129e81cefc195439439f4b23ee7696309d7bc3c08e5b444d2abde26d2f12b2d3bcfd124fb9a2d40c6389e9f787741676fad366a2e9982674e7b931028c014d8a79
-
Filesize
198B
MD51f7f208858a1f652fa7ae45c3c7510c9
SHA1e3b7e0fb73ee579b9e8b6e29f9d9ccd783050a5d
SHA25681b396566964f665632a83714ff09afe24c96e8e5401a588b943d721669de6f4
SHA512cfb0ea1566cd946f39159f01dcecccd98ff4dcc10cd30f85e9bb86af8661acf8b9ad0e6c3e915fdac93959c64158723673eb877ecfec078c1c82a2e11066ba01
-
Filesize
321B
MD522a03f1ec117a8a6c498b9f667555ac3
SHA1a63e7260b764b07934b832328bc8e9bcf75fd10d
SHA25633fdd67870b7604893fe15072d83311992e3777eb9f7bcfe84eb8ad52df76dfb
SHA5122fc2c951d33ef9266e978e804ce3a40ff40a7e68c5039a904bdccf601c5b56e2846d3b328dc2637297f0b856ed5e9234ef47e2bce70fce7120143083e9b703fd
-
Filesize
324B
MD56df68aea12aa3aafd9fd249d2a8cf878
SHA1be257498b5861757ae6bcff8fbfde9db0bef0cad
SHA25650850f8661f59be5ea9a25f714be845514d9e6a1c79c4847ed291a4e188862e5
SHA5127121a8afdb240013c9ced2447b135c5ef2159d0453d6116f23bf18eef9b26003c2b428e1f81565c7ba693e61cf0ebc9e55b70c4e4a66d8f455e041560cadf709
-
Filesize
370B
MD52bc6e79f42933c3608557c5a0ef8b5f2
SHA181f676ffb7597b25a1cc95c9d5196ebf4f2f5796
SHA256ffe34587cd5d790cf0dd4435ac8a8a10d5c5d0365062b7a6f7f86efba5c9a350
SHA5128d40e682b7751e8f9e294e241e8db20fb3540a0d47941634b5c4df1100a56eb09994d5c8a8f519393b7b104db38f68ce5b321038db6da5fb86e85cfa108decc2
-
Filesize
28KB
MD543f06b0ad880f55e7a1c011072e643b3
SHA112f8734a47346647f92ff769c91a7ec5c63ee648
SHA256ec9199fbe747bf8c1a20865bd553017277777a6035497c92b17cb758ce2aee0f
SHA51291b020d508f814bc80add0d0423cc98010c5cb696e744e09219748db4d2b6f4a8f701b619e9832fdedf91e5d7dbbc2cd78cb75c57f9c5a06707b1dc47ceaf987
-
Filesize
13B
MD5b63048c4e7e52c52053d25da30d9c5ab
SHA1679a44d402f5ec24605719e06459f5a707989187
SHA256389caa40ea458e84bc624a9af1e0dec60fa652b2db2b81c09b1dfe22822cc3d1
SHA512e86c58c5a25e24f21ad79ed526a90c120a09c115f4820663bd2ebbc59e7bb1c4c418267eb77645522aa20b2c1b53fba8e31690db7bae9b21e4eff3db06316359
-
Filesize
13B
MD5b63048c4e7e52c52053d25da30d9c5ab
SHA1679a44d402f5ec24605719e06459f5a707989187
SHA256389caa40ea458e84bc624a9af1e0dec60fa652b2db2b81c09b1dfe22822cc3d1
SHA512e86c58c5a25e24f21ad79ed526a90c120a09c115f4820663bd2ebbc59e7bb1c4c418267eb77645522aa20b2c1b53fba8e31690db7bae9b21e4eff3db06316359
-
Filesize
135KB
MD5c98dbe476a98365326def66525b67a3e
SHA1335c520d70f60c4fc4825c94fa145b69939b77a9
SHA256e07f5f217c1a983bbcc4649d4f041d850f701e3c95dec9687e962de5605a0701
SHA51294c5a77cf99099d611a903234df0233035426746b53ef5956440a63d8f22128a9408c62ba3f3034e151a7f35aece88768e7ea3303eb56ac0cc11aaa16db8c15a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e