Analysis
-
max time kernel
100s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-01-2023 14:02
Static task
static1
Behavioral task
behavioral1
Sample
msedge.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
msedge.exe
Resource
win10v2004-20220901-en
General
-
Target
msedge.exe
-
Size
413KB
-
MD5
cee276c40f8aa85fe77c1e43cb87cb9b
-
SHA1
f57853fb3bb038887c0773a100cec95837bc2039
-
SHA256
3a70394c394cb59907b5798a96a582f37ce62885fadd73267df25ad680141289
-
SHA512
7db64681c0d854d1e3beed72ee4cabbd7c71a9eae84c41a9cd03da6e9494986943975596a4a3ba8ac9d164dd27cb4437d16a2b7150f9a78445d06699abe3ca2b
-
SSDEEP
6144:95yaXtrA/WSo1rl3ALrlHQpn0BwK3SBDmhYfFQCU:9TX6WSofcZ+KCIGDU
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1328 pCEUW.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\BackupOpen.tiff taskhost.exe File opened for modification C:\Users\Admin\Pictures\WatchRename.tiff taskhost.exe File opened for modification C:\Users\Admin\Pictures\WatchRename.tiff Dwm.exe -
Deletes itself 1 IoCs
pid Process 1328 pCEUW.exe -
Loads dropped DLL 1 IoCs
pid Process 624 msedge.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\pCEUW.exe" reg.exe -
Enumerates connected drives 3 TTPs 36 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02413_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Medium.jpg taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\PST8PDT Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101862.BMP Dwm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\1047x576black.png taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Cocos taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\RADIO.JPG taskhost.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18197_.WMF Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR26F.GIF Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03451_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00402_.WMF taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-explorer.xml Dwm.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Thimphu taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Premium.css taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\RyukReadMe.txt Dwm.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\RyukReadMe.txt Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03470_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.STP Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143748.GIF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SIGN.CFG taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.Runtime.xml Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-heapwalker.xml taskhost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105380.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\ProPlusWW.XML Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\BriefcaseIcon.jpg Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setEmbeddedCP.bat taskhost.exe File opened for modification C:\Program Files (x86)\Common Files\Services\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GREETING.XML taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Rarotonga Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\RyukReadMe.txt Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090779.WMF Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.IN.XML Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234001.WMF taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_ja_4.4.0.v20140623020002.jar Dwm.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.ELM taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08758_.WMF taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03011U.BMP taskhost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme_0.9.300.v20140424-2042.jar Dwm.exe File opened for modification C:\Program Files\UseOut.aif Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_ja.jar taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kolkata taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Panama Dwm.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\vimeo.luac Dwm.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PDDom.api Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-io.jar Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\TAB_OFF.GIF Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_K_COL.HXK Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_underline.gif Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-api_ja.jar taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\RyukReadMe.txt taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04196_.WMF taskhost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\epl-v10.html Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_ja.jar Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\PABR.SAM Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_left.gif Dwm.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsViewAttachmentIconsMask.bmp Dwm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html taskhost.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-3 taskhost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0300520.GIF taskhost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\RyukReadMe.txt Dwm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 28 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 776 vssadmin.exe 1932 vssadmin.exe 604 vssadmin.exe 71060 vssadmin.exe 34656 vssadmin.exe 71576 vssadmin.exe 1112 vssadmin.exe 71444 vssadmin.exe 71544 vssadmin.exe 37324 vssadmin.exe 1636 vssadmin.exe 71508 vssadmin.exe 71216 vssadmin.exe 71412 vssadmin.exe 48428 vssadmin.exe 1672 vssadmin.exe 1188 vssadmin.exe 71608 vssadmin.exe 1124 vssadmin.exe 71476 vssadmin.exe 43900 vssadmin.exe 1308 vssadmin.exe 240 vssadmin.exe 71200 vssadmin.exe 48324 vssadmin.exe 43924 vssadmin.exe 71640 vssadmin.exe 71672 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2052 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1328 pCEUW.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1328 pCEUW.exe Token: SeBackupPrivilege 71092 vssvc.exe Token: SeRestorePrivilege 71092 vssvc.exe Token: SeAuditPrivilege 71092 vssvc.exe Token: 33 48716 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 48716 AUDIODG.EXE Token: 33 48716 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 48716 AUDIODG.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1120 taskhost.exe 1184 Dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 1328 624 msedge.exe 28 PID 624 wrote to memory of 1328 624 msedge.exe 28 PID 624 wrote to memory of 1328 624 msedge.exe 28 PID 624 wrote to memory of 1328 624 msedge.exe 28 PID 1328 wrote to memory of 692 1328 pCEUW.exe 29 PID 1328 wrote to memory of 692 1328 pCEUW.exe 29 PID 1328 wrote to memory of 692 1328 pCEUW.exe 29 PID 1328 wrote to memory of 1120 1328 pCEUW.exe 19 PID 692 wrote to memory of 992 692 cmd.exe 31 PID 692 wrote to memory of 992 692 cmd.exe 31 PID 692 wrote to memory of 992 692 cmd.exe 31 PID 1328 wrote to memory of 1184 1328 pCEUW.exe 18 PID 1120 wrote to memory of 71024 1120 taskhost.exe 33 PID 1120 wrote to memory of 71024 1120 taskhost.exe 33 PID 1120 wrote to memory of 71024 1120 taskhost.exe 33 PID 71024 wrote to memory of 71060 71024 cmd.exe 35 PID 71024 wrote to memory of 71060 71024 cmd.exe 35 PID 71024 wrote to memory of 71060 71024 cmd.exe 35 PID 71024 wrote to memory of 71412 71024 cmd.exe 39 PID 71024 wrote to memory of 71412 71024 cmd.exe 39 PID 71024 wrote to memory of 71412 71024 cmd.exe 39 PID 71024 wrote to memory of 71444 71024 cmd.exe 40 PID 71024 wrote to memory of 71444 71024 cmd.exe 40 PID 71024 wrote to memory of 71444 71024 cmd.exe 40 PID 71024 wrote to memory of 71476 71024 cmd.exe 41 PID 71024 wrote to memory of 71476 71024 cmd.exe 41 PID 71024 wrote to memory of 71476 71024 cmd.exe 41 PID 71024 wrote to memory of 71508 71024 cmd.exe 42 PID 71024 wrote to memory of 71508 71024 cmd.exe 42 PID 71024 wrote to memory of 71508 71024 cmd.exe 42 PID 71024 wrote to memory of 71544 71024 cmd.exe 43 PID 71024 wrote to memory of 71544 71024 cmd.exe 43 PID 71024 wrote to memory of 71544 71024 cmd.exe 43 PID 71024 wrote to memory of 71576 71024 cmd.exe 44 PID 71024 wrote to memory of 71576 71024 cmd.exe 44 PID 71024 wrote to memory of 71576 71024 cmd.exe 44 PID 71024 wrote to memory of 71608 71024 cmd.exe 45 PID 71024 wrote to memory of 71608 71024 cmd.exe 45 PID 71024 wrote to memory of 71608 71024 cmd.exe 45 PID 71024 wrote to memory of 71640 71024 cmd.exe 46 PID 71024 wrote to memory of 71640 71024 cmd.exe 46 PID 71024 wrote to memory of 71640 71024 cmd.exe 46 PID 71024 wrote to memory of 71672 71024 cmd.exe 47 PID 71024 wrote to memory of 71672 71024 cmd.exe 47 PID 71024 wrote to memory of 71672 71024 cmd.exe 47 PID 71024 wrote to memory of 1124 71024 cmd.exe 48 PID 71024 wrote to memory of 1124 71024 cmd.exe 48 PID 71024 wrote to memory of 1124 71024 cmd.exe 48 PID 71024 wrote to memory of 34656 71024 cmd.exe 49 PID 71024 wrote to memory of 34656 71024 cmd.exe 49 PID 71024 wrote to memory of 34656 71024 cmd.exe 49 PID 71024 wrote to memory of 776 71024 cmd.exe 50 PID 71024 wrote to memory of 776 71024 cmd.exe 50 PID 71024 wrote to memory of 776 71024 cmd.exe 50 PID 71024 wrote to memory of 1308 71024 cmd.exe 51 PID 71024 wrote to memory of 1308 71024 cmd.exe 51 PID 71024 wrote to memory of 1308 71024 cmd.exe 51 PID 1184 wrote to memory of 1056 1184 Dwm.exe 55 PID 1184 wrote to memory of 1056 1184 Dwm.exe 55 PID 1184 wrote to memory of 1056 1184 Dwm.exe 55 PID 1056 wrote to memory of 240 1056 cmd.exe 57 PID 1056 wrote to memory of 240 1056 cmd.exe 57 PID 1056 wrote to memory of 240 1056 cmd.exe 57 PID 1056 wrote to memory of 1112 1056 cmd.exe 59
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\users\Public\window.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:240
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1112
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1932
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71216
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71200
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:604
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:37324
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:43900
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:48428
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:48324
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1672
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:43924
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1188
-
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1636
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\users\Public\window.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:71024 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:71060
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB3⤵
- Interacts with shadow copies
PID:71412
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:71444
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71476
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71508
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71544
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71576
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71608
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71640
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:71672
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1124
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:34656
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:776
-
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1308
-
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\users\Public\pCEUW.exe"C:\users\Public\pCEUW.exe" C:\Users\Admin\AppData\Local\Temp\msedge.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\pCEUW.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\pCEUW.exe" /f4⤵
- Adds Run key to start application
PID:992
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:71092
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:37320
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1c01⤵
- Suspicious use of AdjustPrivilegeToken
PID:48716
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:920
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\RyukReadMe.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2052
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\PopRedo.mpeg"1⤵PID:2116
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\PopRedo.mpeg"1⤵PID:2216
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\Desktop\TraceRemove.pptx"1⤵PID:2372
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
22.8MB
MD5c7f6bd18d56ffae148104a6186f439a1
SHA136f1f7bf1193d8aa092ff45739d3910c562113da
SHA256c0395fe15979335c32ec56c0db730aece404282886a57f7ba5938f00ffbdbf4c
SHA5124dec3a30a187519f8d6c103d2b6f1b7c216b0eda209ac7761a228438c72462fd2b8ae79691c6b3cd1a29c9253c6e68d7cb5c5207505ac698ab71d6f9a6b57094
-
Filesize
2.9MB
MD526c2b6aae4c52dacac9ff9bf2fa8bed8
SHA1a4a780ee0be0bc5ed4a4f7338470795bd31e7720
SHA2569e087bef0845be20d3faf49d3fbbda49393ea0a536c242e91e1dd1d9b533b728
SHA512639cdc7ff52376bece2b0a57de7b4db2bff62cb0dfe07861df224febfae664cdcfa53d1e0fa522c5a1d538b8c5d9f09c18630349008a53c740c87204a8709eae
-
Filesize
23.7MB
MD51ec015cb0176f05ab2a40f49daee0c20
SHA1a50ca5a37dbd9f20f0040408c464690e2f17d50b
SHA256fa415ba07fc62e0e35c4075ec5ed827f342b98aee82949fb26fd2d3226daa635
SHA512322d0a93438e0b185fd8b2a9874e92a6115b4aa5e2dfd32b34660fc7668b2f4545089ec81310c64c320c83bcde9582c93eeb5b9dd06dbc504d9ab8d7f5402e75
-
Filesize
142.4MB
MD5d3fa92c6891f0966ab0bf436b8d2a84b
SHA1158dfee567943d93618886ce46a7ae8f2522ca42
SHA256bcc099cff10c545ec42b00c64da4aa4a9fac9a58084cc027b6f0d057dfe9360d
SHA512070820d4ecb75a4eff2742b62753364e643e87a439c978264bd0417a66c329c3a5695d5c4e15133a277f5cc9df7afeb8e23b8afdb284b12eeaed450de83c3e71
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
31KB
MD56c2fce572b7f3efdfc5272d5c8b05f4a
SHA1aa41fc23d6af51ee2c4d66b76d865390a9cbc6ee
SHA256f7bcafb9143ed1da0d077559464710772c14de40e10a1aa75a27aa5d06ba348e
SHA5123f79be5c15e7ab6e55652cfe91f1094819dc7478d614d5ec1297ba15c1e8bea2353d4beb37f69c39a2e44bdc4c8171e60d7613924c473ac8f4dbf82807c894bb
-
Filesize
1.7MB
MD5d208516f3749963aea53ef6bd1681ee6
SHA1210a5eba9a43936ea91d826349f024491ffdd3e0
SHA2565a47916752b09285cfb3c51d07384ff7b280fe17e7835368de92271b5085d4ac
SHA51279894800e00db80e6a8ecab20c77af4093b50450e00e444188814c6d9f89340ae190143766fa0779e3d8e49690dff05d94530f2c9ba9bc2c3bdc8908d7fc9bfb
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
2KB
MD50637ee542d5fdd0ed4328c01e6d6e741
SHA1de5842c8601c3cc08ffeb4e54b1d443822457b10
SHA256439852557b1ed5ead653c165c9503c185c5447d32a983976e1290999b5fe3d79
SHA51298ba248497f9c83ac857268706582bf2f9ce95ea13eebcd63b7f8eaf50bcbf225ab3056eff64b581760fb42b66b8db5ed645990f3a0ab771b4db1e0e2fa4249f
-
Filesize
1KB
MD566813c9782ed59053a07b948049d2e45
SHA122e06c2e0334345a290e88ab4816baf948ed5472
SHA25689c564542b4036c8a282a7f9e8c75c295e8b13d4ce2c8c71361b0aaaf4df22d9
SHA51293a9622bd096beb25fa3ec62a127372c9fc02f91673ca0add9758d880a9543ccd91a8dd79d169eff8eb370ca519f7747bd8280b7f7a83a3c2c77a351b0874c87
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
2KB
MD5a32d7fcc2167347732a907de57b4b324
SHA197f5661c23bdbf791e5ed6f0fcd09a844343a489
SHA2560bd2391b1c7d2d77b0008e01bed23d07cb2a4a97a7db6802943b2005d532f468
SHA51227e19e71e402aebf099fbaeaf898ba6523f829ab39113b67127978dc03bbf2aacb2dd435fd83cb9562950522f550facca12195693453f793bbe517305d4f1e7e
-
Filesize
1KB
MD559e97d4e6c737ab3929ced7bb593fdd1
SHA11f8987f1004abba3ce103948ad0f70bfd9d118f0
SHA25618889f1f7bb2e3a74acd97906530517630535382e7214dccef0d21751a19edf1
SHA512823b520ec0adc2e7ab1fdfe92e1e9f56f9341c41d1ceb0dbf661fe93711a1a5593039aeb74ab3d03c650b0f6d744f7be7f0cb22c0c6a67fd6acb8bc0782b98ca
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
1KB
MD5859ff398223cae36d7a7787eace6a057
SHA11061f39755edbb7beec06a05fbb328b568ffbef6
SHA256801b610b05139ab70446084c8b54a264ee585f5c9c65f932f04c2a1e521926dc
SHA512bca6a34f1835939869e4607f7a96ea31204552d9428f6fd9f31b6113fd1f7b5fd6d501c8d6c070a9a0490f28883c7ee9888df4e25965e9809f5139a5d83860cc
-
Filesize
2.0MB
MD543f37013ddf38c9788bb3350406c5979
SHA1766224c256436698b28b8993007a7176e36e628a
SHA25635a635c74543162820c111cead30056bf6ed7aedebb22c0d92efdc364b194204
SHA512c6a962649a45489906bd8a6a7649d30b45de5938635a364fe8844af360bd6c58a87c62929139c4375385b05858c9410b1e8356b74b733aeb6cd50ea84d2d3ba0
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
4KB
MD58a2c08674d2e8abb4d12142d5ee50ec2
SHA1e64d2f2d3c159b6c98cc10460ff99171e6f3fd42
SHA256e03506d1d200311fcf77e93841e57c658280606d631519a614dc4d42dc5a3785
SHA5122de22faeace7eca371a3760cb3cd61f1a26202cf45b894f37bc77d0851102d7f1e023a294624d1b2dfe8e7b51c08b0d5212f8872e3dc5ce4b174a329d408ae90
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
41.8MB
MD53b85d91d68cbc3fef3fd41933c29c0e2
SHA13d3af0ebaa9c39a4b30b99902920a48d7b650345
SHA256987ff32c6205cda98e7471c8389d10c1d73c6f53bc482bd790a15952dece86a2
SHA512253b54ab8d06a6be6c212799844f94297fe639c91918b58a1089510c77fbbf357c4ab0046a0e32403a6ad53c29d2ee713e3610882e4bf9b9f3a351e42ed96a82
-
Filesize
2KB
MD51719861589bccfa83f7e4a81c0c355db
SHA118825d7b267fd848694a7e72fd64837f02d44b5c
SHA256fdf5c182f52add3cd907ad86cd23978cb465269ff516913cfb06810553094028
SHA512ff325a46d3088b2a310fb2b47a54bfd21d1d8bbdf0ef965187d3e25f5c30def2d139a0960ddead73ef3e7bdd54ff08cf3c9c4a2ff78ab79885771d826f7fa2cb
-
Filesize
641KB
MD502a151a0af7e155571e0b1237977cbc3
SHA17bcd8710345a254863bc6f56d5648c043439946d
SHA2565e1bbf8dfa81d5eecf7267743d9fc45512a1d2dcf853b07e8a439905a2ffb3d5
SHA512f18959c7762cf16214b1efb1232504e00c013653327315466ff4ec0ada09536c4149dde67b47639c02387ee09c4ef1b10863c6908f9e64b32ea869beeeb92f03
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
12.6MB
MD54ad5d57e7293aa02ab0b83311fee4eb9
SHA16db2fb568cd78ed20fa7b6e691de348e9e02626f
SHA25623797e8ce3e3c0f9c4a742a6532de1297cfcedb5b2b07cebc26eaf56f970914a
SHA5121b2da0b8b4aadcd90ea411f69adcdd91f9157aa0fa5be15a21b51eb73cfba4a5a1bdd1757dcdaa57311f8feab6befea9d421d60d296f0b79fc18cc2c834f0e31
-
Filesize
1KB
MD528f2a0a97ff00104a519cfe4f4b9e5f5
SHA1c6d69bd089babe09a505b9174cd48f6db9ab8852
SHA2560f8d45f07e053c1bd391ecd4b84328339be0fc8c1a9b007b58757f14f87d9b27
SHA51230bacf49406263e708e01c048742363fc3259376060a859bfb2e4d4516852ac87ad1753c5631449f1f4f2f7c4d6eab0eca9b55f39ed7f2355479754173e74c3d
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
652KB
MD54cd1632b72b09a069d80f6dd44c63399
SHA1d5734fc08cb825396d7014f098e7681403041887
SHA256390903054ea11c42d6b2ecbaf73513627520d109b92e5273f684fac1748c210e
SHA5123f0cbd4c22149208e0ff710b34ebc86feefaa5e2768acbf9f59c3d684b0fd32869045b05de9d3a4f928901bc89c664b35687f5c577b21494a717d82e4cd6c31a
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
635KB
MD58e81a0ce114185ae6721e46808fc82ee
SHA13ed5907d3117a2a6b23d9efaaad6c68c5c1e69f3
SHA256fc2e407c8e71c226d85ccc946fb66d98c0108e60ed1f5cce09fdb4b9f946065c
SHA5124774781becaa7d76df46b4e13ab704f9c72d0a26fba8387beaf5cf9a080b2fc6ceee0bab8eb24fbad5f944a26a7f1f39996b7ad6761fef0a3d994c51687c7eb3
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
6KB
MD5298fa09ca9df714846af16cb77660c05
SHA1f5195ff0ca2ba1a8b4a57ca2766305f86f0da17b
SHA25633f64d926752039082ccc1d3cde8607f957983cbfdda0ccce9ca90abc1e853b3
SHA51223064be25dce33b3fef27f85735be487c274c29110aa470722ebd609b830ad3a8105b17917350ccee342992185bd294bb209da2ab3d3d62abbbb8994d34f9eaf
-
Filesize
2.3MB
MD5bfb13e0e9bc0b350acd15e0dc30516c7
SHA1a7ec0fd7cab8b1388598ddac319bc7f808c2c16f
SHA256cd83a44bdf214e65218c31754a0907a97e62738bd1535c5f090cde7c8cde30bd
SHA5127e4a4ce828797ec8873e78d5317927f735d46c169ef0b07ecff15cafe844449ee02e0c7795ac46a6559be25c1ef00558847b6a33207cb96a10cd8f66e2407d5a
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
2KB
MD59577b15097a917e8c44398c1eed85f5e
SHA1a70de33f4620bb479fcce92898baed13ecfdbefd
SHA256fb090b2f80bac5d7ab37dc1bc0262b59ed6d4a747a3099278d4bef69fb2bb2fa
SHA512adc0d1c23363394806391f0a8e0e1db1ba368985e98e07465f3f4c6f0aa377fc59f7ec8d722e770b55ed0fa785948fed9d3087beb31f2a4a758dd82c8129bc8f
-
Filesize
1KB
MD5ccfcfbf8095b633626cca443f2f71f3b
SHA1e0f26dc8bf90eb3ba9c0b6265f0d7d11937a0b64
SHA2565fd967d7aec5b01095866a7e240e79aa33c4e8051a2b16b6b4cc4b6298162aa5
SHA51204aa85f4353a71a9fbbd60214020387d6dcd1acf63fb61671f4d63addeec6a46d9009a8c1dc7be64d08ae4fdc91bdde60219f74ac80c74c5d2667e47de3a7bde
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
2KB
MD564e353dd66521aab8eb8389002e2797a
SHA1e817ca6f18d5e8cb114eb464f919a54f0b3d28ee
SHA256eb6e22dd6dfe14eb0058add3eee68868623b456c3782545ed1e683c87a84e160
SHA512367aa2617551959a7a1dd8d23fc7b66d56af29efde60c024587ba161fd00f4d2b92899da244452d5e15bb373aabf471996a28adfa7d39d8f94857d057f682b69
-
Filesize
1.7MB
MD5d9ef5f6c574f077bdbac75ef35a0ab70
SHA10444659011ed41d7247cb364b08fca2c04f1cee8
SHA25676830279e6d6bdc0f71fa21e292e9f0eb8d99d276a91dcaa1c23100356e28ce6
SHA512f4f2cf120d6eb7d85397a04199bf48f9907f9d2099b2c2ef00cd1698621533b3ead7d824f58a55b919a6473b3fe49cf29edd32869e5c52929fc5807d3606ed16
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
1KB
MD5d389719eeb4a40510b4b75787f0248b0
SHA15926c08b2350d168994ef8e47d47b4dc56ab51e4
SHA256e15102f41319aa417f674b07853780c996c72c2af7c59e6175e5842c68020842
SHA51202133d9e0cd396c922bcd1a020cd5a106d9a002dcbf76e1ad1a2526b7f9404448767e8e549058e1198c6c37cd3100b9f6989f8264f33fcf4f37d03ba80a89b2d
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
2KB
MD59b687e2115ddae9b0dbc9088a1dba2e1
SHA165d17e3b6f6a5feba3fd2ddfb5980f2e92a6bd81
SHA25668ad6bf84e1be49f24b7940db2697d008f25ed4c9e2f69cd329fa921c6ca82c0
SHA5128a5397dcf94cd475b23d0ce1030c4455f46d479541179d7962912c3c5c7c57e543ad7e4ae285ba6688502000769f9bfc87537515b228917ee0711e15626183bc
-
Filesize
2.7MB
MD56ef12623d7ae4dcabe0d43fe01b573dd
SHA1100761fc78803aa84a23b7fb5e8ed67592f6b905
SHA25620574b91ee171032ea4a0d9740faaa2edf337580e52a047964defbed016fd2cb
SHA512b55487537ac11a977165ddf537522c1edd7e2a9bce65c9f46ae229cc0bc89a6bb2b9d738a48b2af34c7a56b5b040793320d07f9eb3776f003774824271b5c4f1
-
Filesize
635KB
MD51d1d7f2a1137991276f655a6a039a04f
SHA102ebb4e07bac2efc692b62e642bf90c40f99a899
SHA2567942c912d6ad788a6c8576196b353132066ee742c6381b22597d5a571a46c4a6
SHA51286971a0cc43168597495c4a43e43419d9305736237adaaae9a1e6caab822104aad9a65c962db74ca2f39481d619be5d0f476cd0d8a9fa072e8f53617f5d12136
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
9KB
MD5e966deb09bbdf475dbdfb4463055c2bb
SHA1570f2ccb04cad64810b5281ea49862bf1dd3e82e
SHA25664e95c1a030a7674d188627a52b4a0cf1bcefdcf755dc928b5005c4d70653910
SHA512d867c459f7018c99f5f69f97219331d25695cc4028c984d5903d9ef62c0bac4711117ad8e1cba07797589562360a9b3a8d54e0b80360a1b52aead4127f2742b4
-
Filesize
26KB
MD5ce122e6a9d31a50554adb8216843fec9
SHA1d02242d8006519ae11e0103bf4f10330ae1b39b8
SHA2561b6c0ff878aca018bc47687590f0cb05443c41737e15778b77493be3c73f4cb1
SHA512d31e49d450051c859357536f8afee51d8fe2758822c035e0348cabef1283416c135cc5b6ff647e00cb581f3bfeb53238c77974383a018c890f491d3383679704
-
Filesize
1.1MB
MD5daeffbeef7190b94f188cc33fc51d708
SHA1ed2d2a9873bd3cff5e686ff7b6cdd1b7d47535a8
SHA2562655f3e070fbe8f20858b3491be04002158bc0540e75d043089065dbb06fc463
SHA5120eda842dfaab85b96399a5172e20cef092441802d2dd9df380a30774f5dc98d3133779fdf359584d2c5fb0181223dc08fa6535352313b650609da3d7f98a5c26
-
Filesize
638KB
MD51916dbe5efa703579e0339fc84cbf5a3
SHA1acf5f8d0c93b70e351450a08ec9092679a5882d0
SHA256044139f9dd3ef0078a92cbcf244f47b5354ad981ecdd5ea0f31bce6f1c89c838
SHA5120ee701e2678a2c3a8a16048220e3d2a37c2cf4d0c203855513db3a06673a03209a2197bcfd7e658d8c1c6018eea7f969c771916f07dd4f6d89b9ead5bf531380
-
Filesize
635KB
MD5a110ca2b3c821a1cc2fd78546c467342
SHA114a80a158a77751879cbc9de17dfdffef0d3e818
SHA256fb2a948236aaa6c37edf05a632f479d5ea529e372133a705c2601e62a8c2d470
SHA512528972de300964d151bb0a918a2c289d9644487fbb0005876a05ccc9ea32ad65af04c592d68b784143d5288649d10a25e67b3bc58c51121416c96008491ea1c0
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_dae2938e-27ce-4a80-bf74-6da89b87415b
Filesize338B
MD522361d210bffbc79609741539c1b6c10
SHA177587ce99795d6cab91a907b9339356a1b5ea3c9
SHA256a562f78c2cb7ba437d821697760500429ee5341f3d13759301da888cb948fe76
SHA5129730a1e5b7db2a909ea21d02c80b9fec0291a9e551fee0280d6bed99549be8c6207a5107dd62678bc8fd67e1977135b278e0ef5ad645739ebb00a31625ab5fde
-
Filesize
804B
MD5cd99cba6153cbc0b14b7a849e4d0180f
SHA1375961866404a705916cbc6cd4915de7d9778923
SHA25674c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2
SHA5120c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda
-
Filesize
170KB
MD531bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249
-
Filesize
1KB
MD5d2aba3e1af80edd77e206cd43cfd3129
SHA13116da65d097708fad63a3b73d1c39bffa94cb01
SHA2568940135a58d28338ce4ea9b9933e6780507c56ab37a2f2e3a1a98c6564548a12
SHA5120059bd4cc02c52a219a0a2e1836bf04c11e2693446648dd4d92a2f38ed060ecd6c0f835e542ff8cfef8903873c01b8de2b38ed6ed2131a131bdd17887c11d0ec
-
Filesize
12KB
MD5b6acc24d357e0c9a276984ab3c669ce5
SHA1952454d6404ff93111868a327acac28abe259ad2
SHA256547c36175b43d5aa6a58482409b9f99cea3ba4610260bcd077b54f7bf38d0cd8
SHA512f08f327f29a3ba5a33c04c2d5ed02d1c329d97a3df4c4d9708456fe24c4cbbbf1fa4cf595f7c58181b289ef0536f9010254c87cf73d566ea58d94915df447a12
-
Filesize
160KB
MD53209a8ae0e857fbbe8586134ffd52b93
SHA133c60ab7a229db92935cca4fb0d957b17483517b
SHA256ffb01968b704fba5aad240578c8fa6184190b2edb42df44fdd4c5a04eb02ead0
SHA512440f927667a51fd79a4a5708238b3eadcaf52361dc21ecc84684de17c6b457eff038905cd7ecce631c3e7094940f40d1d7da2dda0cd834031533ee4ba5d9ea70
-
Filesize
1.2MB
MD533b9ad67a166f5ada25b319b94b91dc0
SHA1ed25f6113cb77a664ff37ef1d689aef1681a0512
SHA256ce0860f190f005689aace68e9190bcc1ed54e16ad1e75ed29ca2202b457ef0fa
SHA51233e5f0eb71d1851771b146c635eb0d1fb99e38e30ce14bf09aa95ecbc9c8c741cbdf71ab87abea0ec69ea9cecc627d4c73045029a49a3a0399c6541142808a74
-
Filesize
509KB
MD54ba8e8bd150be1f7aa27e99bf5b12849
SHA16b3947d9be395b9c431a0dc41011906713993560
SHA256f4be0b30571c27f98fad2060c2d511f24c626140c544dd07608953c21c26aa8b
SHA512eb4391f36761be1170f61b11f732a55a11388163d80cbd95b419b1bab72ac20c7976d173acbd200298af4a22a537bafbca876d6d61d508eb4073e154546475c5
-
Filesize
486KB
MD5cb885393ae02bb7eef193458f6f8c417
SHA11a62403d44520ed7a8eb6b0afaf4381bb10e7365
SHA2560f0ac165dec75124586f1da2e30decf16d139d326fc0e1855e54e94aec1d2385
SHA512520ad4e60a72c7e556725495615abba2e9c12e9345d31ec999e40399a96746e2e4417c49fae345e5160c36c8fd0d0ad19526d377075aca6863204f94f17f314c
-
Filesize
362KB
MD55a87da74ef5fbc2d4f49d0343be20a57
SHA1858b30300ef7e56806d34919692a4bbfd8b08fa2
SHA256bc0b5de91d95599739e8ed6d7825adf69ef05b7f3283ff337df7b42f0be94bcd
SHA51204359048232668bff958401de4116c08edd60d551599fcdc48740a5ba38efac411f7f48884a514e07afe287fc2053d06c8df8b7283f5fd2f0ed1ffeb93a4305c
-
Filesize
170KB
MD531bd0f224e7e74eee2847f43aae23974
SHA192e331e1e8ad30538f38dd7ba31386afafa14a58
SHA2568b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d
SHA512a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249