Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 13:34
Static task
static1
Behavioral task
behavioral1
Sample
pa4yg3aq2.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
pa4yg3aq2.exe
Resource
win10v2004-20231023-en
General
-
Target
pa4yg3aq2.exe
-
Size
2.0MB
-
MD5
e5e0fa7832b6630d54f99da00087ffca
-
SHA1
8300201409248528bcc9ec16d54296658fc77a74
-
SHA256
bfa636627ea8a5fc3053875e45eee1c0ae08d442c71ccfb9b672457229895548
-
SHA512
c6c2532e22ae3a180b29b9d4be63fed41116080d5e135c41c87bf59ef7dddbc8b5e22f2aa098e2b3a1f6ae296aab4172d924c36908dff4c4ad412e201692850f
-
SSDEEP
49152:wgwRFifu1DBgutBPNzbLZFFpimjrkrFmaCntQxi7AJVqDsHpm:wgwRFvguPPpbdYsgF1wtQ87ADosg
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Instruction.txt
Signatures
-
Detects Mimic ransomware 15 IoCs
resource yara_rule behavioral1/files/0x00060000000155f5-29.dat family_mimic behavioral1/files/0x00060000000155f5-30.dat family_mimic behavioral1/files/0x00060000000155f5-31.dat family_mimic behavioral1/files/0x0009000000014f13-37.dat family_mimic behavioral1/files/0x0006000000015c86-59.dat family_mimic behavioral1/files/0x0006000000015c86-58.dat family_mimic behavioral1/files/0x0006000000015c86-61.dat family_mimic behavioral1/files/0x0006000000015c86-66.dat family_mimic behavioral1/files/0x0006000000015c2d-73.dat family_mimic behavioral1/files/0x0006000000015c86-83.dat family_mimic behavioral1/files/0x0006000000015c86-84.dat family_mimic behavioral1/files/0x0006000000015c86-86.dat family_mimic behavioral1/files/0x0006000000015c86-87.dat family_mimic behavioral1/files/0x0006000000015c86-89.dat family_mimic behavioral1/files/0x0006000000015c86-90.dat family_mimic -
Mimic
Ransomware family was first exploited in the wild in 2022.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" conUpdate.exe -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1892 bcdedit.exe 1712 bcdedit.exe -
Renames multiple (200) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2104 wbadmin.exe -
pid Process 1164 wbadmin.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchProtocolHost.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchApp.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsqmcons.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\beserver.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CoreSync.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocomm.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pvlsvr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine_x86.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsnapvss.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wxServerView.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsqmcons.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutodeskDesktopApp.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbserver.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\httpd.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tomcat6.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-opt.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tv_x64.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xfssvccon.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\java.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgrN.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VeeamDeploymentSvc.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Creative Cloud.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-opt.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\java.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xfssvccon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\axlbridge.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\benetns.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-nt.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocautoupds.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchApp.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspub.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocautoupds.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\raw_agent_svc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wdswfsafe.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineElevatedCfg.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wdswfsafe.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bengien.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msaccess.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msaccess.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW32.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bengien.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydesktopservice.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAgui.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqbcoreservice.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ssms.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tomcat6.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\benetns.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dbsnmp.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdlauncher.exe conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW64.exe conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\httpd.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oracle.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VeeamDeploymentSvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\encsvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SimplyConnectionManager.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TeamViewer.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" conUpdate.exe -
Deletes itself 1 IoCs
pid Process 672 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 1888 7za.exe 2992 7za.exe 2676 pa4yg3aq2.exe 2928 conUpdate.exe 2260 conUpdate.exe 1724 conUpdate.exe 1092 conUpdate.exe 1900 Everything.exe 1104 Everything.exe -
Loads dropped DLL 17 IoCs
pid Process 2232 pa4yg3aq2.exe 2232 pa4yg3aq2.exe 2232 pa4yg3aq2.exe 2676 pa4yg3aq2.exe 2676 pa4yg3aq2.exe 2928 conUpdate.exe 2928 conUpdate.exe 2260 conUpdate.exe 2928 conUpdate.exe 1724 conUpdate.exe 2928 conUpdate.exe 1092 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe -
Modifies system executable filetype association 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" pa4yg3aq2.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command pa4yg3aq2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" pa4yg3aq2.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command conUpdate.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command conUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" conUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command pa4yg3aq2.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell pa4yg3aq2.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open pa4yg3aq2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" conUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conUpdate = "\"C:\\Users\\Admin\\AppData\\Local\\{D30E6601-C68C-38F9-FF44-7884977CF18D}\\conUpdate.exe\" " pa4yg3aq2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conUpdate.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\U: conUpdate.exe File opened (read-only) \??\X: conUpdate.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\Y: conUpdate.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\P: conUpdate.exe File opened (read-only) \??\W: conUpdate.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\V: conUpdate.exe File opened (read-only) \??\Z: conUpdate.exe File opened (read-only) \??\G: conUpdate.exe File opened (read-only) \??\L: conUpdate.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\M: conUpdate.exe File opened (read-only) \??\R: conUpdate.exe File opened (read-only) \??\E: conUpdate.exe File opened (read-only) \??\H: conUpdate.exe File opened (read-only) \??\T: conUpdate.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\N: conUpdate.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\K: conUpdate.exe File opened (read-only) \??\S: conUpdate.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\I: conUpdate.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\A: conUpdate.exe File opened (read-only) \??\B: conUpdate.exe File opened (read-only) \??\O: conUpdate.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\J: conUpdate.exe File opened (read-only) \??\Q: conUpdate.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\Z: Everything.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" pa4yg3aq2.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open conUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.pa4yg3aq2 conUpdate.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command pa4yg3aq2.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile pa4yg3aq2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile conUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command pa4yg3aq2.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell pa4yg3aq2.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open pa4yg3aq2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pa4yg3aq2\ = "mimicfile" conUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" pa4yg3aq2.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" conUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\mimicfile\shell\open\command conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell conUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\Instruction.txt\"" conUpdate.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1724 conUpdate.exe 1092 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2928 conUpdate.exe 2296 powershell.exe 2880 powershell.exe 1644 powershell.exe 2928 conUpdate.exe 2928 conUpdate.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1888 7za.exe Token: 35 1888 7za.exe Token: SeRestorePrivilege 2992 7za.exe Token: 35 2992 7za.exe Token: SeSecurityPrivilege 2992 7za.exe Token: SeSecurityPrivilege 2992 7za.exe Token: SeIncreaseQuotaPrivilege 2676 pa4yg3aq2.exe Token: SeSecurityPrivilege 2676 pa4yg3aq2.exe Token: SeTakeOwnershipPrivilege 2676 pa4yg3aq2.exe Token: SeLoadDriverPrivilege 2676 pa4yg3aq2.exe Token: SeSystemProfilePrivilege 2676 pa4yg3aq2.exe Token: SeSystemtimePrivilege 2676 pa4yg3aq2.exe Token: SeProfSingleProcessPrivilege 2676 pa4yg3aq2.exe Token: SeIncBasePriorityPrivilege 2676 pa4yg3aq2.exe Token: SeCreatePagefilePrivilege 2676 pa4yg3aq2.exe Token: SeBackupPrivilege 2676 pa4yg3aq2.exe Token: SeRestorePrivilege 2676 pa4yg3aq2.exe Token: SeShutdownPrivilege 2676 pa4yg3aq2.exe Token: SeDebugPrivilege 2676 pa4yg3aq2.exe Token: SeSystemEnvironmentPrivilege 2676 pa4yg3aq2.exe Token: SeChangeNotifyPrivilege 2676 pa4yg3aq2.exe Token: SeRemoteShutdownPrivilege 2676 pa4yg3aq2.exe Token: SeUndockPrivilege 2676 pa4yg3aq2.exe Token: SeManageVolumePrivilege 2676 pa4yg3aq2.exe Token: SeImpersonatePrivilege 2676 pa4yg3aq2.exe Token: SeCreateGlobalPrivilege 2676 pa4yg3aq2.exe Token: 33 2676 pa4yg3aq2.exe Token: 34 2676 pa4yg3aq2.exe Token: 35 2676 pa4yg3aq2.exe Token: SeIncreaseQuotaPrivilege 2928 conUpdate.exe Token: SeSecurityPrivilege 2928 conUpdate.exe Token: SeTakeOwnershipPrivilege 2928 conUpdate.exe Token: SeLoadDriverPrivilege 2928 conUpdate.exe Token: SeSystemProfilePrivilege 2928 conUpdate.exe Token: SeSystemtimePrivilege 2928 conUpdate.exe Token: SeProfSingleProcessPrivilege 2928 conUpdate.exe Token: SeIncBasePriorityPrivilege 2928 conUpdate.exe Token: SeCreatePagefilePrivilege 2928 conUpdate.exe Token: SeBackupPrivilege 2928 conUpdate.exe Token: SeRestorePrivilege 2928 conUpdate.exe Token: SeShutdownPrivilege 2928 conUpdate.exe Token: SeDebugPrivilege 2928 conUpdate.exe Token: SeSystemEnvironmentPrivilege 2928 conUpdate.exe Token: SeChangeNotifyPrivilege 2928 conUpdate.exe Token: SeRemoteShutdownPrivilege 2928 conUpdate.exe Token: SeUndockPrivilege 2928 conUpdate.exe Token: SeManageVolumePrivilege 2928 conUpdate.exe Token: SeImpersonatePrivilege 2928 conUpdate.exe Token: SeCreateGlobalPrivilege 2928 conUpdate.exe Token: 33 2928 conUpdate.exe Token: 34 2928 conUpdate.exe Token: 35 2928 conUpdate.exe Token: SeIncreaseQuotaPrivilege 2260 conUpdate.exe Token: SeSecurityPrivilege 2260 conUpdate.exe Token: SeTakeOwnershipPrivilege 2260 conUpdate.exe Token: SeLoadDriverPrivilege 2260 conUpdate.exe Token: SeSystemProfilePrivilege 2260 conUpdate.exe Token: SeSystemtimePrivilege 2260 conUpdate.exe Token: SeProfSingleProcessPrivilege 2260 conUpdate.exe Token: SeIncBasePriorityPrivilege 2260 conUpdate.exe Token: SeCreatePagefilePrivilege 2260 conUpdate.exe Token: SeBackupPrivilege 2260 conUpdate.exe Token: SeRestorePrivilege 2260 conUpdate.exe Token: SeShutdownPrivilege 2260 conUpdate.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1900 Everything.exe 1104 Everything.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1888 2232 pa4yg3aq2.exe 28 PID 2232 wrote to memory of 1888 2232 pa4yg3aq2.exe 28 PID 2232 wrote to memory of 1888 2232 pa4yg3aq2.exe 28 PID 2232 wrote to memory of 1888 2232 pa4yg3aq2.exe 28 PID 2232 wrote to memory of 2992 2232 pa4yg3aq2.exe 30 PID 2232 wrote to memory of 2992 2232 pa4yg3aq2.exe 30 PID 2232 wrote to memory of 2992 2232 pa4yg3aq2.exe 30 PID 2232 wrote to memory of 2992 2232 pa4yg3aq2.exe 30 PID 2232 wrote to memory of 2676 2232 pa4yg3aq2.exe 32 PID 2232 wrote to memory of 2676 2232 pa4yg3aq2.exe 32 PID 2232 wrote to memory of 2676 2232 pa4yg3aq2.exe 32 PID 2232 wrote to memory of 2676 2232 pa4yg3aq2.exe 32 PID 2676 wrote to memory of 2928 2676 pa4yg3aq2.exe 33 PID 2676 wrote to memory of 2928 2676 pa4yg3aq2.exe 33 PID 2676 wrote to memory of 2928 2676 pa4yg3aq2.exe 33 PID 2676 wrote to memory of 2928 2676 pa4yg3aq2.exe 33 PID 2676 wrote to memory of 2928 2676 pa4yg3aq2.exe 33 PID 2676 wrote to memory of 2928 2676 pa4yg3aq2.exe 33 PID 2676 wrote to memory of 2928 2676 pa4yg3aq2.exe 33 PID 2928 wrote to memory of 2036 2928 conUpdate.exe 34 PID 2928 wrote to memory of 2036 2928 conUpdate.exe 34 PID 2928 wrote to memory of 2036 2928 conUpdate.exe 34 PID 2928 wrote to memory of 2036 2928 conUpdate.exe 34 PID 2928 wrote to memory of 2260 2928 conUpdate.exe 36 PID 2928 wrote to memory of 2260 2928 conUpdate.exe 36 PID 2928 wrote to memory of 2260 2928 conUpdate.exe 36 PID 2928 wrote to memory of 2260 2928 conUpdate.exe 36 PID 2928 wrote to memory of 2260 2928 conUpdate.exe 36 PID 2928 wrote to memory of 2260 2928 conUpdate.exe 36 PID 2928 wrote to memory of 2260 2928 conUpdate.exe 36 PID 2928 wrote to memory of 1724 2928 conUpdate.exe 37 PID 2928 wrote to memory of 1724 2928 conUpdate.exe 37 PID 2928 wrote to memory of 1724 2928 conUpdate.exe 37 PID 2928 wrote to memory of 1724 2928 conUpdate.exe 37 PID 2928 wrote to memory of 1724 2928 conUpdate.exe 37 PID 2928 wrote to memory of 1724 2928 conUpdate.exe 37 PID 2928 wrote to memory of 1724 2928 conUpdate.exe 37 PID 2928 wrote to memory of 1092 2928 conUpdate.exe 38 PID 2928 wrote to memory of 1092 2928 conUpdate.exe 38 PID 2928 wrote to memory of 1092 2928 conUpdate.exe 38 PID 2928 wrote to memory of 1092 2928 conUpdate.exe 38 PID 2928 wrote to memory of 1092 2928 conUpdate.exe 38 PID 2928 wrote to memory of 1092 2928 conUpdate.exe 38 PID 2928 wrote to memory of 1092 2928 conUpdate.exe 38 PID 2928 wrote to memory of 1900 2928 conUpdate.exe 39 PID 2928 wrote to memory of 1900 2928 conUpdate.exe 39 PID 2928 wrote to memory of 1900 2928 conUpdate.exe 39 PID 2928 wrote to memory of 1900 2928 conUpdate.exe 39 PID 2232 wrote to memory of 672 2232 pa4yg3aq2.exe 40 PID 2232 wrote to memory of 672 2232 pa4yg3aq2.exe 40 PID 2232 wrote to memory of 672 2232 pa4yg3aq2.exe 40 PID 2232 wrote to memory of 672 2232 pa4yg3aq2.exe 40 PID 2928 wrote to memory of 1480 2928 conUpdate.exe 42 PID 2928 wrote to memory of 1480 2928 conUpdate.exe 42 PID 2928 wrote to memory of 1480 2928 conUpdate.exe 42 PID 2928 wrote to memory of 1480 2928 conUpdate.exe 42 PID 2928 wrote to memory of 2116 2928 conUpdate.exe 43 PID 2928 wrote to memory of 2116 2928 conUpdate.exe 43 PID 2928 wrote to memory of 2116 2928 conUpdate.exe 43 PID 2928 wrote to memory of 2116 2928 conUpdate.exe 43 PID 2928 wrote to memory of 932 2928 conUpdate.exe 45 PID 2928 wrote to memory of 932 2928 conUpdate.exe 45 PID 2928 wrote to memory of 932 2928 conUpdate.exe 45 PID 2928 wrote to memory of 932 2928 conUpdate.exe 45 -
System policy modification 1 TTPs 11 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection\AllowTelemetry = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HidePowerOptions = "1" conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" conUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conUpdate.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection conUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Policies\System conUpdate.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\pa4yg3aq2.exe"C:\Users\Admin\AppData\Local\Temp\pa4yg3aq2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p57795808188112786 Everything64.dll2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\pa4yg3aq2.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\pa4yg3aq2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe"C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe"3⤵
- UAC bypass
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Checks whether UAC is enabled
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd.exe /c DC.exe /D4⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe"C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe" -e watch -pid 2928 -!4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe"C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe" -e ul14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe"C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\conUpdate.exe" -e ul24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\Everything.exe"C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\Everything.exe" -startup4⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -H off4⤵PID:1480
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:2116
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:932
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:928
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:1732
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:1664
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:548
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:2820
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:948
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c4⤵PID:2796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -S e9a42b02-d5df-448d-aa00-03f14749eb614⤵PID:2600
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:2268
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:1164
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:1288
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:1808
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1892
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:1712
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe DELETE SYSTEMSTATEBACKUP4⤵
- Deletes System State backups
- Drops file in Windows directory
PID:2104
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet4⤵
- Deletes backup catalog
PID:1164
-
-
C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\Everything.exe"C:\Users\Admin\AppData\Local\{D30E6601-C68C-38F9-FF44-7884977CF18D}\Everything.exe" -startup4⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- Deletes itself
PID:672
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:568
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:1800
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2732
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5744ed28bdf07d9655e5264ec3af09ea7
SHA101a553b6b6c43be770140894e803312ee63104b4
SHA25624588c595cf725e8a6cd141205cb3e6e6cb842f237a78f987fa176db0b194cb1
SHA5129f7458915b858677cfb93d963f36b42544fe219169a163044fb6c0cfd6c45b3841bd1acd5229cc8c64f8067b974cc1b044e0280e03c410f921166110d8f73ea7
-
Filesize
190B
MD565fb5c3b2616d26184696e3a272326e1
SHA19797aacf5f9b56ba47fbf1e5b6540c4c9de4eddb
SHA256da1de2516b71967e79df089c94682d8831548d0225caa4710f774cabef0a4421
SHA5120182ca38e908ba483af09a767534002ae120b62f208701b6bdd37e2fb5723caa437e0c6fc1c81509fbf559fa71d1ae0138d9ef41c5f999921107855345988d2e
-
Filesize
190B
MD565fb5c3b2616d26184696e3a272326e1
SHA19797aacf5f9b56ba47fbf1e5b6540c4c9de4eddb
SHA256da1de2516b71967e79df089c94682d8831548d0225caa4710f774cabef0a4421
SHA5120182ca38e908ba483af09a767534002ae120b62f208701b6bdd37e2fb5723caa437e0c6fc1c81509fbf559fa71d1ae0138d9ef41c5f999921107855345988d2e
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
548B
MD5742c2400f2de964d0cce4a8dabadd708
SHA1c452d8d4c3a82af4bc57ca8a76e4407aaf90deca
SHA2562fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01
SHA51263a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4
-
Filesize
550B
MD551014c0c06acdd80f9ae4469e7d30a9e
SHA1204e6a57c44242fad874377851b13099dfe60176
SHA25689ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5
SHA51279b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
1.0MB
MD5bef200dd988fc9dc3d1ac8f592937301
SHA1f483b29b765892efbb0fc575bcdff374dfdd1db1
SHA2562d5c71deb88a3aff94540753f8f8acbb4b55fdf481c02f3ca4357d4cad57285b
SHA5127f1e6debddf1fc240eba32d0a3460354f96126447ef25803212cabb93d4340c5724e32dbaaaf16962548ff3c4d7b580ecd0be746ec43d6c295dd893877ffc13b
-
Filesize
2.1MB
MD53f681cedfcbf23227a99ca6dda5a1b6f
SHA13e702f7696f57f4a7cf955b8e9b2fe91e6be19b8
SHA2566139aa57b4c8b8d6039d9293e9eb99a37a9183183d6461a256a77862ba30cdff
SHA512f1ffc12c44f6cbeaec8ac6888ce9fe8081dde1775064cd720d7195efbfaf9fb612dc363d2d4db26529bc841540671ab6f8b7a84f492666db36d4a9b878a14850
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
350KB
MD5803df907d936e08fbbd06020c411be93
SHA14aa4b498ae037a2b0479659374a5c3af5f6b8d97
SHA256e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c
SHA5125b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
9.2MB
MD53076f790ce643623ed98824660b39dda
SHA15a547e0131c839946a7b92ad7669213eddd6cc06
SHA256ca943d2212ae1f61eafc1096e117aeb9d7007148940f04c41f41e22e62321f4f
SHA512d06f0272d97a8cc282e649ee0fe0204f8f95a37635c69c432a85111bd0665139df3dba5753c59a4795c7a35e9f4303f4da5c56d841cdfd55a668c4dba4799af6
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
548B
MD5742c2400f2de964d0cce4a8dabadd708
SHA1c452d8d4c3a82af4bc57ca8a76e4407aaf90deca
SHA2562fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01
SHA51263a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4
-
Filesize
20KB
MD5cbb70969962d1188b74d8522d7278c07
SHA19e000d27fceb02c503fbf44b8f13aad0c3aae72c
SHA25653b15d993c532018095db3a53949005593906dd37f61dfae72e45be95ce7bd5d
SHA512a07053d909a56616ae7d15ea55ca2cf23ed810e5b204eeb9d38f82e65ce67f4057428535cf11cea7d3e589a6ccf0ec79bd456bdc1548fd71b7d63ba617c981bd
-
Filesize
550B
MD551014c0c06acdd80f9ae4469e7d30a9e
SHA1204e6a57c44242fad874377851b13099dfe60176
SHA25689ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5
SHA51279b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
1.0MB
MD5bef200dd988fc9dc3d1ac8f592937301
SHA1f483b29b765892efbb0fc575bcdff374dfdd1db1
SHA2562d5c71deb88a3aff94540753f8f8acbb4b55fdf481c02f3ca4357d4cad57285b
SHA5127f1e6debddf1fc240eba32d0a3460354f96126447ef25803212cabb93d4340c5724e32dbaaaf16962548ff3c4d7b580ecd0be746ec43d6c295dd893877ffc13b
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.1MB
MD53f681cedfcbf23227a99ca6dda5a1b6f
SHA13e702f7696f57f4a7cf955b8e9b2fe91e6be19b8
SHA2566139aa57b4c8b8d6039d9293e9eb99a37a9183183d6461a256a77862ba30cdff
SHA512f1ffc12c44f6cbeaec8ac6888ce9fe8081dde1775064cd720d7195efbfaf9fb612dc363d2d4db26529bc841540671ab6f8b7a84f492666db36d4a9b878a14850
-
Filesize
350KB
MD5803df907d936e08fbbd06020c411be93
SHA14aa4b498ae037a2b0479659374a5c3af5f6b8d97
SHA256e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c
SHA5125b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d888d1241f689fe78d03a40d0ada04f0
SHA1cb85ac4aacfd386023466c22a5d4a7a42ffe8422
SHA2569de1d8a9ccc1771c9e17243373246751b76a230b1d0b8e34234d05b9240ff091
SHA5129e80452a461e63b083bd8af1ba962dcff5f0159f17b180b2e5a445d97ac5e7ab50fdf729c75ba50217970d79ab629cd13253c0d69c1e15962e7818073ef1e547
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5d888d1241f689fe78d03a40d0ada04f0
SHA1cb85ac4aacfd386023466c22a5d4a7a42ffe8422
SHA2569de1d8a9ccc1771c9e17243373246751b76a230b1d0b8e34234d05b9240ff091
SHA5129e80452a461e63b083bd8af1ba962dcff5f0159f17b180b2e5a445d97ac5e7ab50fdf729c75ba50217970d79ab629cd13253c0d69c1e15962e7818073ef1e547
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\65YV3TW67IEBAU3ULFYO.temp
Filesize7KB
MD5d888d1241f689fe78d03a40d0ada04f0
SHA1cb85ac4aacfd386023466c22a5d4a7a42ffe8422
SHA2569de1d8a9ccc1771c9e17243373246751b76a230b1d0b8e34234d05b9240ff091
SHA5129e80452a461e63b083bd8af1ba962dcff5f0159f17b180b2e5a445d97ac5e7ab50fdf729c75ba50217970d79ab629cd13253c0d69c1e15962e7818073ef1e547
-
Filesize
5KB
MD5693480d42cc928b1c73bf6e4a3d46178
SHA147ae5a2d95cb6675562ae164edddf97ab34fc19a
SHA256d46af47532da5744ace075279b90c6efcf835b2c3dc3e09569ef25357395b22f
SHA5123c8a735e4e59cbe510b1c125dcca96174bf661841c7388fac22e73be8061517d704874fbfb072342b551a1fa84d49183b9f1fbd6be9e174a63f5614584b68ecc
-
Filesize
32B
MD53408ffcbcbfe467453334eefdcec5a9e
SHA1c7f0dcbf053771ac8f4b7f43166eba92121d576b
SHA256c4308e82a3c2e916aa51d4cc42bce3c550a37df47b086d814d693414b5814f7b
SHA51284bcc7ea2a7f5f2b7fe6643308a233e70796f7cda54c5aa8f5d6a6de48a1466925f938345d2d5262fc5ef89a63a9e032a5fee225219e5302904dedce3c7f2c4c
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad
-
Filesize
2.0MB
MD535b02a5e8fb661526c6feab0d48131dc
SHA10fc1f7405bbe7fc247b1513eb8e3dee106a41bff
SHA256084f828fc318863adb8dc98d97bc5fd11b5770971afc97fe3315c3cc348d9a56
SHA5124978bd097f3bfc287c19f50e43f6c8ea6b04ae1583613c4da2b43effa06726d3555ba6d2beccc17bf066d2b3e91d649ec30e8126ec3fdbe05e5b48144b8a10ad