Analysis
-
max time kernel
554s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe
Resource
win10v2004-20231215-en
General
-
Target
a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe
-
Size
3.2MB
-
MD5
6d44f8f3c1608e5958b40f9c6d7b6718
-
SHA1
9203ad3b6ffb7732591ef560965566555bce9d82
-
SHA256
a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455
-
SHA512
656eb44b563705e1045b6a881b4f8a462ecf3bb8b2421cb18dfa21421629f7af92fe4b72736edfe3fea2ea13bef84f5faab5a78b8ef2b4f656a9055d0c4a22bd
-
SSDEEP
98304:wgwRevguPPFpugyxQkvA51nFbk+kUwWlGroD+1f:wgtv7ov5vqbk++AGkD+1f
Malware Config
Signatures
-
Detects Mimic ransomware 10 IoCs
resource yara_rule behavioral1/files/0x0007000000014721-31.dat family_mimic behavioral1/files/0x0007000000014721-30.dat family_mimic behavioral1/files/0x0007000000014721-29.dat family_mimic behavioral1/files/0x0006000000014b5b-61.dat family_mimic behavioral1/files/0x0006000000014b5b-59.dat family_mimic behavioral1/files/0x0006000000014b5b-58.dat family_mimic behavioral1/files/0x0006000000014b5b-66.dat family_mimic behavioral1/files/0x0006000000014b5b-104.dat family_mimic behavioral1/files/0x0006000000014b5b-107.dat family_mimic behavioral1/files/0x0006000000014b5b-105.dat family_mimic -
Mimic
Ransomware family was first exploited in the wild in 2022.
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" DC.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" YOURDATA.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2616 wevtutil.exe 3068 wevtutil.exe 1752 wevtutil.exe -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2688 bcdedit.exe 1240 bcdedit.exe -
Renames multiple (6297) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 556 wbadmin.exe -
pid Process 1028 wbadmin.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tomcat6.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdhost.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\httpd.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-opt.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\java.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tv_x64.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CoreSync.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbguard.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdlauncher.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydesktopqos.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlservr.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msexchangeis.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\beserver.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlbrowser.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vxmon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xfssvccon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msexchangeis.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CompatTelRunner.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bedbh.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outlook.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydesktopservice.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pvlsvr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdhost.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msaccess.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tbirdconfig.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tomcat6.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msftesql-exchange.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msftesql-exchange.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBIDPService.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAgui.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqbcoreservice.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\axlbridge.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\benetns.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocautoupds.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tbirdconfig.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msexchangesa.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbserver.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBIDPService.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW32.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlservr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TeamViewer_Service.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isqlplussvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsDtSrvr.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\raw_agent_svc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsnapvss.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wxServerView.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchApp.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineElevatedCfg.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VeeamDeploymentSvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsDtSrvr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msftesql.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\oracle.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\python.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe -
Deletes itself 1 IoCs
pid Process 2280 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2712 7za.exe 2820 7za.exe 2640 3usdaa.exe 3024 YOURDATA.exe 2272 DC.exe 1588 YOURDATA.exe 1680 YOURDATA.exe 1620 YOURDATA.exe 1240 bcdedit.exe 1600 Everything.exe 1632 xdel.exe 1044 xdel.exe -
Loads dropped DLL 21 IoCs
pid Process 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 2640 3usdaa.exe 2640 3usdaa.exe 3024 YOURDATA.exe 1840 cmd.exe 1588 YOURDATA.exe 1680 YOURDATA.exe 1620 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe -
Modifies system executable filetype association 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 3usdaa.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command YOURDATA.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open 3usdaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" 3usdaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 3usdaa.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command 3usdaa.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell 3usdaa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection DC.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YOURDATA = "\"C:\\Users\\Admin\\AppData\\Local\\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\\YOURDATA.exe\" " 3usdaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YOURDATA.exe = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\----Read-Me-----.txt\"" YOURDATA.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" YOURDATA.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\M: bcdedit.exe File opened (read-only) \??\N: bcdedit.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\K: bcdedit.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\G: bcdedit.exe File opened (read-only) \??\L: bcdedit.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\I: bcdedit.exe File opened (read-only) \??\J: bcdedit.exe File opened (read-only) \??\S: bcdedit.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\E: bcdedit.exe File opened (read-only) \??\P: bcdedit.exe File opened (read-only) \??\T: bcdedit.exe File opened (read-only) \??\W: bcdedit.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\U: bcdedit.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\A: bcdedit.exe File opened (read-only) \??\H: bcdedit.exe File opened (read-only) \??\O: bcdedit.exe File opened (read-only) \??\Q: bcdedit.exe File opened (read-only) \??\V: bcdedit.exe File opened (read-only) \??\X: bcdedit.exe File opened (read-only) \??\Z: bcdedit.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\B: bcdedit.exe File opened (read-only) \??\R: bcdedit.exe File opened (read-only) \??\Y: bcdedit.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\L: Everything.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini DC.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol DC.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.fca YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\[email protected] YOURDATA.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\[email protected] YOURDATA.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-gibbous_partly-cloudy.png.getmydata@list.ru.3000USDAA YOURDATA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\[email protected] YOURDATA.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Common Files\System\msadc\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\[email protected] YOURDATA.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Classes\mimicfile\shell\open\command YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open YOURDATA.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command 3usdaa.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open 3usdaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" 3usdaa.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell\open\command YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command YOURDATA.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile\shell 3usdaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Classes\.3000USDAA YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 3usdaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 3usdaa.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\exefile 3usdaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\----Read-Me-----.txt\"" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.3000USDAA\ = "mimicfile" YOURDATA.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2272 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 DC.exe 2272 DC.exe 2272 DC.exe 2272 DC.exe 1680 YOURDATA.exe 1620 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 3024 YOURDATA.exe 628 powershell.exe 2164 powershell.exe 1624 powershell.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe 1680 YOURDATA.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2712 7za.exe Token: 35 2712 7za.exe Token: SeRestorePrivilege 2820 7za.exe Token: 35 2820 7za.exe Token: SeSecurityPrivilege 2820 7za.exe Token: SeSecurityPrivilege 2820 7za.exe Token: SeIncreaseQuotaPrivilege 2640 3usdaa.exe Token: SeSecurityPrivilege 2640 3usdaa.exe Token: SeTakeOwnershipPrivilege 2640 3usdaa.exe Token: SeLoadDriverPrivilege 2640 3usdaa.exe Token: SeSystemProfilePrivilege 2640 3usdaa.exe Token: SeSystemtimePrivilege 2640 3usdaa.exe Token: SeProfSingleProcessPrivilege 2640 3usdaa.exe Token: SeIncBasePriorityPrivilege 2640 3usdaa.exe Token: SeCreatePagefilePrivilege 2640 3usdaa.exe Token: SeBackupPrivilege 2640 3usdaa.exe Token: SeRestorePrivilege 2640 3usdaa.exe Token: SeShutdownPrivilege 2640 3usdaa.exe Token: SeDebugPrivilege 2640 3usdaa.exe Token: SeSystemEnvironmentPrivilege 2640 3usdaa.exe Token: SeChangeNotifyPrivilege 2640 3usdaa.exe Token: SeRemoteShutdownPrivilege 2640 3usdaa.exe Token: SeUndockPrivilege 2640 3usdaa.exe Token: SeManageVolumePrivilege 2640 3usdaa.exe Token: SeImpersonatePrivilege 2640 3usdaa.exe Token: SeCreateGlobalPrivilege 2640 3usdaa.exe Token: 33 2640 3usdaa.exe Token: 34 2640 3usdaa.exe Token: 35 2640 3usdaa.exe Token: SeIncreaseQuotaPrivilege 3024 YOURDATA.exe Token: SeSecurityPrivilege 3024 YOURDATA.exe Token: SeTakeOwnershipPrivilege 3024 YOURDATA.exe Token: SeLoadDriverPrivilege 3024 YOURDATA.exe Token: SeSystemProfilePrivilege 3024 YOURDATA.exe Token: SeSystemtimePrivilege 3024 YOURDATA.exe Token: SeProfSingleProcessPrivilege 3024 YOURDATA.exe Token: SeIncBasePriorityPrivilege 3024 YOURDATA.exe Token: SeCreatePagefilePrivilege 3024 YOURDATA.exe Token: SeBackupPrivilege 3024 YOURDATA.exe Token: SeRestorePrivilege 3024 YOURDATA.exe Token: SeShutdownPrivilege 3024 YOURDATA.exe Token: SeDebugPrivilege 3024 YOURDATA.exe Token: SeSystemEnvironmentPrivilege 3024 YOURDATA.exe Token: SeChangeNotifyPrivilege 3024 YOURDATA.exe Token: SeRemoteShutdownPrivilege 3024 YOURDATA.exe Token: SeUndockPrivilege 3024 YOURDATA.exe Token: SeManageVolumePrivilege 3024 YOURDATA.exe Token: SeImpersonatePrivilege 3024 YOURDATA.exe Token: SeCreateGlobalPrivilege 3024 YOURDATA.exe Token: 33 3024 YOURDATA.exe Token: 34 3024 YOURDATA.exe Token: 35 3024 YOURDATA.exe Token: SeDebugPrivilege 2272 DC.exe Token: SeAssignPrimaryTokenPrivilege 2272 DC.exe Token: SeIncreaseQuotaPrivilege 2272 DC.exe Token: 0 2272 DC.exe Token: SeIncreaseQuotaPrivilege 1588 YOURDATA.exe Token: SeSecurityPrivilege 1588 YOURDATA.exe Token: SeTakeOwnershipPrivilege 1588 YOURDATA.exe Token: SeLoadDriverPrivilege 1588 YOURDATA.exe Token: SeSystemProfilePrivilege 1588 YOURDATA.exe Token: SeSystemtimePrivilege 1588 YOURDATA.exe Token: SeProfSingleProcessPrivilege 1588 YOURDATA.exe Token: SeIncBasePriorityPrivilege 1588 YOURDATA.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1240 bcdedit.exe 1600 Everything.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2712 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 28 PID 1272 wrote to memory of 2712 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 28 PID 1272 wrote to memory of 2712 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 28 PID 1272 wrote to memory of 2712 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 28 PID 1272 wrote to memory of 2820 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 31 PID 1272 wrote to memory of 2820 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 31 PID 1272 wrote to memory of 2820 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 31 PID 1272 wrote to memory of 2820 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 31 PID 1272 wrote to memory of 2640 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 32 PID 1272 wrote to memory of 2640 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 32 PID 1272 wrote to memory of 2640 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 32 PID 1272 wrote to memory of 2640 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 32 PID 2640 wrote to memory of 3024 2640 3usdaa.exe 33 PID 2640 wrote to memory of 3024 2640 3usdaa.exe 33 PID 2640 wrote to memory of 3024 2640 3usdaa.exe 33 PID 2640 wrote to memory of 3024 2640 3usdaa.exe 33 PID 3024 wrote to memory of 1840 3024 YOURDATA.exe 35 PID 3024 wrote to memory of 1840 3024 YOURDATA.exe 35 PID 3024 wrote to memory of 1840 3024 YOURDATA.exe 35 PID 3024 wrote to memory of 1840 3024 YOURDATA.exe 35 PID 1840 wrote to memory of 2272 1840 cmd.exe 36 PID 1840 wrote to memory of 2272 1840 cmd.exe 36 PID 1840 wrote to memory of 2272 1840 cmd.exe 36 PID 1840 wrote to memory of 2272 1840 cmd.exe 36 PID 3024 wrote to memory of 1588 3024 YOURDATA.exe 38 PID 3024 wrote to memory of 1588 3024 YOURDATA.exe 38 PID 3024 wrote to memory of 1588 3024 YOURDATA.exe 38 PID 3024 wrote to memory of 1588 3024 YOURDATA.exe 38 PID 3024 wrote to memory of 1680 3024 YOURDATA.exe 40 PID 3024 wrote to memory of 1680 3024 YOURDATA.exe 40 PID 3024 wrote to memory of 1680 3024 YOURDATA.exe 40 PID 3024 wrote to memory of 1680 3024 YOURDATA.exe 40 PID 3024 wrote to memory of 1620 3024 YOURDATA.exe 39 PID 3024 wrote to memory of 1620 3024 YOURDATA.exe 39 PID 3024 wrote to memory of 1620 3024 YOURDATA.exe 39 PID 3024 wrote to memory of 1620 3024 YOURDATA.exe 39 PID 3024 wrote to memory of 1240 3024 YOURDATA.exe 96 PID 3024 wrote to memory of 1240 3024 YOURDATA.exe 96 PID 3024 wrote to memory of 1240 3024 YOURDATA.exe 96 PID 3024 wrote to memory of 1240 3024 YOURDATA.exe 96 PID 1272 wrote to memory of 2280 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 43 PID 1272 wrote to memory of 2280 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 43 PID 1272 wrote to memory of 2280 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 43 PID 1272 wrote to memory of 2280 1272 a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe 43 PID 3024 wrote to memory of 1808 3024 YOURDATA.exe 79 PID 3024 wrote to memory of 1808 3024 YOURDATA.exe 79 PID 3024 wrote to memory of 1808 3024 YOURDATA.exe 79 PID 3024 wrote to memory of 1808 3024 YOURDATA.exe 79 PID 3024 wrote to memory of 1004 3024 YOURDATA.exe 78 PID 3024 wrote to memory of 1004 3024 YOURDATA.exe 78 PID 3024 wrote to memory of 1004 3024 YOURDATA.exe 78 PID 3024 wrote to memory of 1004 3024 YOURDATA.exe 78 PID 3024 wrote to memory of 1532 3024 YOURDATA.exe 51 PID 3024 wrote to memory of 1532 3024 YOURDATA.exe 51 PID 3024 wrote to memory of 1532 3024 YOURDATA.exe 51 PID 3024 wrote to memory of 1532 3024 YOURDATA.exe 51 PID 3024 wrote to memory of 652 3024 YOURDATA.exe 44 PID 3024 wrote to memory of 652 3024 YOURDATA.exe 44 PID 3024 wrote to memory of 652 3024 YOURDATA.exe 44 PID 3024 wrote to memory of 652 3024 YOURDATA.exe 44 PID 3024 wrote to memory of 840 3024 YOURDATA.exe 47 PID 3024 wrote to memory of 840 3024 YOURDATA.exe 47 PID 3024 wrote to memory of 840 3024 YOURDATA.exe 47 PID 3024 wrote to memory of 840 3024 YOURDATA.exe 47 -
System policy modification 1 TTPs 13 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HidePowerOptions = "1" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Policies\System YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = " " YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection\AllowTelemetry = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Your data on your system has been encrypted by us....\n\nWe want you to know that you will not get your data back with the usual data recovery methods...\n\nWe will restore your data for 3000 dollars.\n\nYou can send an e-mail with your reference code below\n\nWe Do Not Negotiate \nWe do not give discounts.\nThe price is very reasonable\n\n\n######################################################################\n\nIf you contact me to ask for a discount or to negotiate, I will increase the price I offer.\n\n######################################################################\n\nWhen you send us an e-mail, please send us your reference code below\n\n=> YOUR REFERENCE CODE <=\n\nk4yFfrP0EpK5fJyMUYIgqQ_GWVHXPpsBC0b_apawZFE*[email protected]\n\n=> OUR E-MAIL ADDRESS <=\n\[email protected]\[email protected]\[email protected]" YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer YOURDATA.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe"C:\Users\Admin\AppData\Local\Temp\a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p58042791667523172 Everything64.dll2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\3usdaa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"3⤵
- UAC bypass
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd.exe /c DC.exe /D4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\DC.exeDC.exe /D5⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e watch -pid 3024 -!4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e ul24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" -e ul14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe" -startup4⤵PID:1240
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:652
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:840
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:1152
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:1532
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:1564
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:2368
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:2148
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:1776
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵PID:1676
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:1552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -S e9a42b02-d5df-448d-aa00-03f14749eb614⤵PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c4⤵PID:2044
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵PID:692
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵PID:1004
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -H off4⤵PID:1808
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet4⤵
- Deletes backup catalog
PID:1028
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe DELETE SYSTEMSTATEBACKUP4⤵
- Deletes System State backups
- Drops file in Windows directory
PID:556
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2688
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1240
-
-
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\Everything.exe" -startup4⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe "C:\Users\Admin\AppData\Local\----Read-Me-----.txt"4⤵PID:1572
-
-
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe" -accepteula -p 1 -c F:\4⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe"C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\xdel.exe" -accepteula -p 1 -c C:\4⤵
- Executes dropped EXE
PID:1044
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security4⤵
- Clears Windows event logs
PID:2616
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application4⤵
- Clears Windows event logs
PID:3068
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system4⤵
- Clears Windows event logs
PID:1752
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /d /c "ping 127.2 -n 5 & fsutil file setZeroData offset=0 length=20000000 "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe" & cd /d "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}" & Del /f /q /a *.exe *.ini *.dll *.bat *.db"4⤵PID:2352
-
C:\Windows\SysWOW64\PING.EXEping 127.2 -n 55⤵
- Runs ping.exe
PID:2272
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=20000000 "C:\Users\Admin\AppData\Local\{3E72089C-1A3A-DF6C-7071-175DF7BCDA76}\YOURDATA.exe"5⤵PID:848
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- Deletes itself
PID:2280
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:356
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2668
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:2640
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2124
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846B
MD5dd9e90eb56018de70e07803a0c39b572
SHA1fa24b1e0ba288c976119d0edf674316c6c4c1ca0
SHA25680b870a2f130d6b657bc37c67ce7620f70f8c6048906e51faf3ca791ddc667ee
SHA512acbf9a7d407bb3b3eff1dcd9dce4a429912e17c8d84d5a5ec1fc73ae429fcf4796d0271bff6ad77ce6493a243b203e64e3c79a8c5ed8d960a6c4ac0e3274adeb
-
Filesize
300B
MD5e1a82f783e5da276aaee7cd82b8f0634
SHA108ee4d34971a8a1d237b9fb44025b75552c25ab1
SHA256785df04aad0f47e60a439c7c9a495cd6143d3f8f7f39435f687df0ac5f5e232f
SHA5124b4a9345c6dc53fbc74ce92bc436d93082f6b6cd3483614a28bd58aea96d49b2d760d39e3207c1fad90fa2eb550007d2bbb0da3d7bab86fea20918299cba3006
-
Filesize
154KB
MD5aae6093037f213cea60bbdc9a575be0b
SHA15047d812a6762f17c3b0735482cd027a3c3d6678
SHA256c1280d7547433bae2e9e7dccf7d67df549125ffe05a45d4aed62044f82c77a24
SHA512399b10f29a437f7cb9ecc35404e1666e6cae496a3e37fe5397e81cfd51917f448140e5dda0b76a8028e63577f0b2561407dedccf8cfb0f3bbf29c48939269f0b
-
Filesize
273KB
MD563101e08dbc5a152b2eefa2ab5c4f77e
SHA14ba554c9798b00e26ca4382d165c56c05b6f95b0
SHA2562eabcf007f6d10e42c836dde89d53806e1fd036e39abe33f3a079f6401523270
SHA512120ea97a9cfeac1fea840e4d4e5161b084b3ad9bbced7f335f167d464b4e05e256e281b0e7bb8d012e1a0b022bd287c66c88904c5d78baeff5ace61fd5ceb4c4
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5
-
Filesize
691KB
MD590f0c2bec634b46744c503441b10ea63
SHA1721758d4d501612a7d89d4228047f073bec8e001
SHA256f83286c0ad61887d81837f5a3036fe54c2170e20d214593dd0bde96a0d4a8360
SHA51211a90c8ac05738212a33adc6a08478c61e3c88d8947e9ca80024f1557dc9e2d19a306e5b499df9518255cefdd70ba08d06dfbbf4b69064340b406e2611d5f681
-
Filesize
331KB
MD5ab5803a655b62cb7f9f6e292aae0c2ea
SHA1c5767ed6e3f3b53d588d9b4e6fafdb6fdfa3c84c
SHA256faf4c36da4deb8e1b6e7c5707c34109523cd950b64bb5590d579ee0ca120c620
SHA512b345a548af5cf109e26eade8f6b2c1ee062913b638d7fb8cb1591117127c584ac32928a8a170eba98a7446f35636bd24d306b0d4f7ba3f3d3faa8a30e427f901
-
Filesize
76KB
MD5e7267d7a96c98fd23ea911d4856dd3c7
SHA115addf66cd1c9d711752149851a0aa4d16f22e6b
SHA256c992bd0d14990ebbc4eb65f0ad906dcf52dcbbe2c10329bfe3a33b3ba7928350
SHA5129eb0aacd4662ccfb0ee00fe61f60c33ad5b4dc24e7ed96d4d22bf0301c8194efacc3d5ee973246eff85cc8692790531f3e1ba8b763734848850b22319b22a444
-
Filesize
66KB
MD5bc41b397de7579f39b0830e482fcce01
SHA13a99a320d7744f461656a88c634b5cd6797da16c
SHA256b7d63021c54e51f61dd3797cdbfa4cd8bd67d8102bca20365a49d80716aea940
SHA512117b28feca2de336a2dd40b2c54e70661f0d77cc883328b178055537a5b28df2ace1ddd4ab6509e23280936b3c5ebac4b6566b996f762d3ac1506180870d6dee
-
Filesize
19KB
MD5668516a16fd633d6bb0dec10071ad2d8
SHA16559ecc360680d43ea86ce55a40768fa4c075b13
SHA256a463617d5877f2527460468a07e450dd1491366047065f6b6788309734da9968
SHA512728b4f65b93020b0735c498a6560dbcf1c39a0b3dad2f5d04a916917c600024bfa449a4222c52b1a3ccedfbbad8e2363755c4675e91f10aae01545a2fbfbafef
-
Filesize
548B
MD5742c2400f2de964d0cce4a8dabadd708
SHA1c452d8d4c3a82af4bc57ca8a76e4407aaf90deca
SHA2562fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01
SHA51263a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4
-
Filesize
550B
MD551014c0c06acdd80f9ae4469e7d30a9e
SHA1204e6a57c44242fad874377851b13099dfe60176
SHA25689ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5
SHA51279b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c
-
Filesize
270KB
MD55b011bb82df81fad886677fb8857ce7c
SHA1cae91622dba5c28dd9b829467a94524caf3ba549
SHA256ec7c12ad1a7c299c0419290338af0dac0cd203f5787ef5dbab8b6bcf75af1b51
SHA5126398fd6deaf06b1a4330e101ed1af19f31d67ed76071158232a2e0fb075c63d30706c697ecbb5c21f9b1983209d8c9aae921a61ce6306e68b99f053598c1bbf2
-
Filesize
45KB
MD5ead20666e5ba26ba27e013ad87cafc7a
SHA19ccb87d9fcc6223cd0dd78722a4d5b0cb0f43afd
SHA256431dd6b8ff175d38619e673fb3cb6ada3254826d0f45db82f4e2a37862c47f81
SHA512f708300003ec4f32eb8a76456fe554acd8f5643c9d3bc5d699acd112625d7b678eef5e5da4ab67daec8a741a3c700126e3b84518fb4667a97483594d7974dc2a
-
Filesize
96KB
MD5287aa8782b3f6adddc1539bfa3af710e
SHA1e4073e145c05fb5addb75ac46ab36aa0444ccd78
SHA256552db5908b561a6fe7d182e55d959a84c5d165d9b509997bcd56080aa8f8bbc3
SHA512c69226bb34dc03a7d3dbbb18b3a74f48c184b92b2687ec86024d1f30c79f681c595ffa46b08fc2d1262b95a970d345c4ed881f794eac8ac8982cf2d556a21d1d
-
Filesize
129KB
MD5c7bb6f0f57cc0e8d9e33a381f49c7ca0
SHA164afea5749a4154a9727cd80a2bf4a4822ce9cab
SHA256e9b60a2b2591778947fc9822d0e00ec09156c5797be530884dfe5e8a3503d9b2
SHA51202b75fab9d38b6c4444fe311486266a9d4b959335eb34001807eed16bc16479e69ca0de433c4a8c39dbb517cfcf1b79f643fcdea72dfb441db4a1af189e0bc8e
-
Filesize
59KB
MD5cd52074d2c09e7377ae2c209186e3e99
SHA12dc0283e7a8bcb71e104ed9e9747e26859f1ccf3
SHA256537b444294d536eabfeeebf5fcdefdc978d6a499184c885b8ffc344ccd17b1ea
SHA512d068683c376bd3bf4c089213a17ba15bd118af305d337f783aed1b30ddfbcf84a74557a93e0a8d93604f6bf7321a7269fb7edfe70b8ebcefe7dcc0aaf44d9c10
-
Filesize
103KB
MD5ac4672086345b60f1d77aca98cf2df94
SHA1e4f0f2423eb0b9c24154eb56d8f7458364ea954a
SHA2564327ae8de9c905e715b10af905b6496b1c5a0d1c3e575494f9f07107eb23cdc7
SHA512f63326ae7ef3fa69221c33c601ee05fd3b740dcb32180c50a7b9c8d4464eb9483e1506311d8fad4b39ef553f75351d1b3d45aefbd3135ba7aa923d4e8b8d52f8
-
Filesize
807KB
MD50115a4b993fee86b17e560c4e06fa344
SHA1c6c54173b582ee8e44e91e386c297724f8132ba0
SHA25646272cab1ba69be056ebd197914ac478549dfd17917becacfc8cb378e9c0167d
SHA512584d7520ea00136635960da24fd0023f0e38125e7a0bb48ad966efa7f926fbc96fa18f21472a1b43c6d2fe82e1e1a74ca49f10eaf4193aac5925ad90798559fe
-
Filesize
1.3MB
MD5df0928dadf351e67684cff0c13fed156
SHA1a2bebd5339158c1eaa9759a1da4aecba2604aa6c
SHA256f981cfb683a5b8e001da20603c63ebdecc8c80edaf3f2ffd9673a2dda4e4930f
SHA5120cbf40ffe27469995a9a4754b90d6697db21a640f65bf7f304ffe093ecb6a56aa37f4cdc88f38f6e117fe8be9f1fb87016433644e8ae04cfdec4576413f106d3
-
Filesize
208KB
MD59a94cc0b2428ae1a2af8e969ac1676dc
SHA1ddcec7ef1e63776859d25392fd3ed6a804a86b7a
SHA256ccf6d35bfaeca8fefa30ae2b76beb8eef2416eedafe57347e2507a806b931536
SHA512559d9737febb2b63bb5aecc7893e5da581bf27ae8575d39ffabe782acc84085ec34504a3f57f0333dd654b8b1dd0e5b692059ed8a68658dfe2940a2e3cb4f251
-
Filesize
705KB
MD569c0f15d9c1f474ff65136c6a3c21893
SHA1620ac9f36008fab26bde269f8626705720b6b54d
SHA25625a18d76e34aa301b2c3378f50529f9029f8f5359af4e49703b047bba6fcc89e
SHA51286d51648ddd37313afaf3baa38c37dd932899e2f4d42683b2d7512bd9b82e41d6a49e26f390c74b0adc3b58aa62fddb31ca650af4c7a28aee2581c98464d6291
-
Filesize
105KB
MD53326055f5eff0986b1058681e9515a31
SHA1b87c53f9d388e03bb32662295e36e611ced12f1c
SHA256723b2d83f0dca7a2e5419cacb03a10d073563a22350c7a8f5f74034832f379fa
SHA51213db9d708f166ea68a545d622860217f8bb32a18dc32b633e9021df9ab9beef10ba475714e676cce2a3ada3f5746cdb95e8d458b1d659bed5b2d86db6d729659
-
Filesize
20KB
MD5b821c2baf2bdac1332cc7b4fbac5a10c
SHA10934daa887991dd765430bcf4b0082f9d70c5114
SHA25632711a762557549a5daf62d7f727a4a61f4cbe094e7423a7b886add95c5788e2
SHA512747e1516f4e5d9f2bcc1df151c05d83f28d677fc7709fda71e1f08ef18375c85ba6c6725da30c805fe1c6f45a4304e3a6d808bd923aba459755d6ec087283a9b
-
Filesize
7KB
MD5f4537cae1258bc6d33b402fa5c89962d
SHA15213ad4ba9e6bbe7241817664a5f95a46283caf6
SHA2567a5591b87249f9a76b97a572bebdff7200aab1752b6d1d432316de8f00d50552
SHA512d9c123501db31a5a827882c161c1386a4ca753560a93b4f28e2cf5e1a93ceb4fb63b8d36c3e363608d68251da4c1b50f2c5ea5bdbae1abca015187612eef83ed
-
Filesize
169KB
MD52a3f077d1f6ba07694df6d709a3a5b53
SHA1dee7fe568bfcaebc7d201c0be80cca11fc2a2439
SHA256a23c7c448c7e800002657d914ca57ba50932fbeaa7f698dfeb7a6a17eb6eacca
SHA5122cafb33476f6f5a612a8e9aaf90bfe09e9b2c10e9d96a517d3061683fd08d8e9b723cacc9e06b236f16307f6980429b92544baf7c114d23529395717c0c790be
-
Filesize
47KB
MD5afa8bdc4ce5dd32f16c9f65a0977c267
SHA1b771c5a7509efd041efbc9d026ef9736d4f88869
SHA256d3929134c96e400035b99ca22ab1b5de26cb00a040ce1f30546e7425c119e6c9
SHA5121a7d6071af2b80967abc312c89dc9a69319e5982c05d0da03bd237468ffa6e9fa1bc898e581e10515a054f02f52d181bdfec9d31ee9474469971908bdff0bd25
-
Filesize
50KB
MD51e0ee54ecd8badaa9a80376c3d0dc967
SHA1ca612b109151e10f88cd4af667e5e89193129dc1
SHA2563f1a36fd4eadb1f2d05d3103a7fb712d5e8d297dc1c6c923ca6d052920a39641
SHA512f6b11cefcfa52d0abc0c1057823540e5e52c0198dbc15f97622a39e2fe92b972b20aac2956b4c72e0341c4ff0b1ee07fe0a169003229f35d47110bb23b2f7c13
-
Filesize
43KB
MD506e91f7bb696e00a861e892b5d58539a
SHA139a99703a280d92a443a9ae752359572ac88cdcf
SHA2569920946208bb391b901aa20f9f88242bbac8d7b05cfcc1627d5520b6d981fb5a
SHA512b409ea78576f996ce10b45a7668f01956474584fedced796b1da9a3b4e0ad89564961f3e9411462eb2dabc0a2a8e99031f6d1f27add40c39d0da359bc81d4da0
-
Filesize
18KB
MD5906ebb253a2c0e66671fc43491e8ffcc
SHA1758446c875874bfb1afcf99eed833be58a019fcd
SHA25669bddcfe1be5b5e17e3ea658188ba13cfd2fa558e414a05247a7f9b868da9d44
SHA51200569d661832ba0a99998ff41f026ce58f602515709122ba43d810e88c97288e54c8c30de82b210b401b0bcdc20b4e9c686bb224004c4ccfd21aa47cefe617f2
-
Filesize
81KB
MD5d796ad6f58252c5feb60085fac866090
SHA16ddbe0c47f7f317f5342fefec2400dd3a83c4004
SHA2561b9f00114c41ca8b5c6a2c1e3f530f477d1d428289eddf82b8632cf47c574256
SHA512220ed6345cfc41e71653821191c3c00f7c96ee9da666e7dbe8c366f990e0e3c9f8974bea24ae9d539eeb51868f2a2edbef52697b7246ad79e4631361c5972abf
-
Filesize
152KB
MD5c2ad3180f32f897c6c03158593400057
SHA1be707a904bcd14a77c97f85e2ecf373414d7c17d
SHA2565e68599b39f42d6b371dfa5b740e7517887ae6c7d266377fdb5a28f34133d2e6
SHA51298d34145eb778a46f550535ef55ff333b349ef52ea69a50d209e8ce4d7fb1954b8f51f2de8e7ff67e54230920bff156b507b7643bba43f62820f6d3c5824e0ec
-
Filesize
50KB
MD561d2d4bcba17ce09f4923eb5d9c6fae0
SHA1400c421ca869775fefc1dbd7d86a1dbe18112b4d
SHA25659999c5eed0217f915db2a534452a26baa544786ab06e6691b6eacffdf4b3bc0
SHA5127eeda0586d258c080315d602d28119dd1233aaa5eea523c0a70e2c53be79d22b8649f97cd9f015ff24bdb8ab19fd424aa980e39d9b8ab68df3ffe5d251e84465
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD580c0d221db4fa7e00ac7543c9c165579
SHA1e2030a0fe0997dcd8ed2e5bdd9b29fe4f9490f61
SHA25621c7df237b0d135de888dc1a0754e24bb7c450a012eb38687b2034b508345181
SHA51286ab5cdca0675ec55b09a4815bc355b97a16c636c01f2042cdd3c9f79638df9a34a14e26d6eda4996e4b9725dbf2a61745f40c0fb15e40f23cec23f63c6f9657
-
Filesize
233B
MD5cd4326a6fd01cd3ca77cfd8d0f53821b
SHA1a1030414d1f8e5d5a6e89d5a309921b8920856f9
SHA2561c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c
SHA51229ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67
-
Filesize
31KB
MD51619f9e9d912932054052515c2753c4e
SHA1badbf21b9f67da25605f54af77468503b13a7afc
SHA256877f15c165fbdce0b7264c0b75dad3375c71397d799933fede60933866371f71
SHA5123b2121c3de806e4d3c08a852a309ca8f68f7d8dacdf5579d1bd95b4597e6193842367dc68045a1a1541c5c63d1fa9a37ed8ca27d5aff338344aab515b3c817cc
-
Filesize
1KB
MD50bdfbadfe39a69ceafd508c41baa6d48
SHA11ac42f1df853ffa3c8a32206b45b9b6481b5c846
SHA2561448e1ef416c59374bb0c86da0e07e56e5b86361351adfa7bfb7cf3dd92a2c9a
SHA51224678776d1d528f71e2f44961f3b92e3237b6ceeb32b733f80598daae0cefb1bb412f3764e78e571ea199e333682fe395c5601ce47ede6184e2d92e1a616b839
-
Filesize
32B
MD5e9dcbfe427f52fb495e3649774247af1
SHA16f07721cc977e1268df2108d875f4f7dbda171c3
SHA256d18c812fa86b466d2a0dd9aab8e020620b4f8232fb44043cd7904b929e2b1a5c
SHA5122f754654c31ec43fa6bd0a2830493f96976144d0089679e35bb1aaec8b3ad3de90dea77bfceac8593275c610787e941f8785778b0b95617f5822bef6291a9098
-
Filesize
197KB
MD569c851b016202d534bce3902329a0a72
SHA1d7c3b75a659843da9d757aff5afc23b727830c23
SHA256ba0b8d4c304a85d4435dc836f7d0d49f9395838ea30e1dbb9b1e20b017e72f1a
SHA512bb9b2c4aff884d29bec5cdb5a49337b5cc85ed25ffce13a8f269362eca638d827c79ec550fed81e06e9ada65da94ec39be56346c08ec71601f949a4df0f73e1e
-
Filesize
338KB
MD52645378f682d033cf741d7efd72c55c5
SHA1d680894183bd9e5631341f8eb16f3f4300b51567
SHA2565995bd22ba118e3ba36d455b48efadb4cb2c06cc1474d52afd4853bf116a3923
SHA512596227234b974b233f4fc4ccb1038658e40f02b78aa7038c5cd8ee0fda5bbc8e267c46cbe9bbf5990d05745f6cc6f4e26e0e8aa52198f6b319351a2536e32d53
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
51KB
MD5915e14064e5f18e93f9bb309386b764c
SHA1c6cfa760d2bfd3b8bdec35a78a4b5a5aee4d23f7
SHA25645d8821e9e85b5db584bc879a03ad894cbf1c112b5c2b575e98ba5a6b2a2fdda
SHA512bbed023557c4f03e37f4374cbdebc68b92f7c4fab1c3d74042b696ff6fe7fd02a1946959b87d93e7181dda201a4209064fb61c1ea34c55c7fe8e01b914edaf8d
-
Filesize
245KB
MD552cb30ee630d0ce8a880955e2c13dcb9
SHA1a26bf0c07e52cd3ca747116bebd0d6cf661e443b
SHA2565414c454d7220c39d4c64e4af5fb1895ade437b22398a2de908a88623e5a1497
SHA512eea00d4fec681c8c0f2de566fe32305bf0b7180534db7b898328b407cfbb1fb6b89abd412b6ea8e2b55057c733eea037f5c9fc943b9eb22b8154a39a30a71a64
-
Filesize
86KB
MD5742b1d6b0b370f575b758e9ba2ee5dca
SHA1183f73bb4f9fd98cb13583eb6afecc6607a3fb83
SHA25619683399862282d0da26c2a4a6b654dde5a8381237cf0370c306f2c023ecb550
SHA51259f8b3f8abeeb84f34c34adacba49e93fb5bf6c2e5d3e49e05f1946218a0e2ba08e5531001e51f1490e4be7fa5ee54228ba3118dd2c0b236fd64f8640e1e26da
-
Filesize
231KB
MD52ae07cee39ba472505cf0b02690e46da
SHA1e2d0827837d40b8ae3681c4813d93fd31d431e78
SHA25666b6f85dd83bef033bd97d8bc916e511c54d6a8ccb8fa19ba9359bec9a616d0a
SHA51297145239e63fe0c0a609058c311f23137366eee03a8467f5e9f7a1976eb01462fdc776b78ad9145d46b505a8371be64373786b2a87f761c0c0ac6c9123d934a9
-
Filesize
190KB
MD5257711955ae3524fb7e39408298419de
SHA12073b358c2746611da7abc038c9204eb39eb8056
SHA2569ae451ed44a8c3c4f7e1393847b3de74d5c1d152e2d2a292141af22c14f756a5
SHA5123a087d78e9886c6eeab05e692583d4fb354bba066b19f66fef6b31583e45bf4c7df70e93c05487700b0910fcb52c73e2da7cfed22acc90c6c28d682bc8a0fd85
-
Filesize
223KB
MD5484466553a027aaf69a9674041b623d3
SHA13350eff2b5785fc8a34744d3e7bda5a2f601933a
SHA2569d2ffe543c8fa61d88d1727573116c9777c3b508fa0f05958bfe9e4d92f4e5b7
SHA512890187bd5046114a0ad89d8c0110b5ad1daf91b079cd220c09e0bc0f5a031755615173013755a51e672d010448dbbc09ffe99db2681557760b9bbc4a6ad7c32d
-
Filesize
72KB
MD5cc9b5aed08aea61a125fa61c7bdee3ad
SHA17b0c7354c1b4b919ad5b7e22ec1f1b719113fbff
SHA2567d2cc7d1d6c601edd368ef738a6cd313ab44fd3619a802826122fa5204fa98ac
SHA512bdf521287d42e0ea852aa556e68c25ab89942a24f3ef83952c3c383b6ba4bcb327efbc31a0cde165fdae1e8f8b283b78d530c0ada2d1b346952274cdde1bfe93
-
Filesize
65KB
MD520ed05feb58321b5c35b53982bb412cb
SHA1c7c4827e75a0d05dd96c3f84d2c881c33cc43dba
SHA256d0ce5135325d607cd45025f143d164071769431af5ab14dda37546ae7c29abf5
SHA5124e1c9d6602a60524a7a3f3e0cbc8ab7dc2a2fac86b5dab37d0bc2440976b0c2b186b4e79d187777b12179bb88bfc7b2830ef4a28c25ed81def411443270f5068
-
Filesize
24KB
MD5ffe26ea9c7447b598704d5abf995e132
SHA16f283eb485b18afff879fa123d452634ee3285e7
SHA2565cd7e98ecfba0b1d7a54e70866ee969a3888a349043d2a2c2350be224e57df37
SHA51209e576b37d7a9bb487bc3e32eb7a11b4b952f546d3f2a9931d0746c9c1e85041769915a04aeab6022cee5afedca7f63d3ba33a3e6c8908bf556ee0764448b49f
-
Filesize
35KB
MD52f5c46e9d7d2c53223ad0d163acc1fd3
SHA1387d3ae2c3ac5e23d556715a341cbff93e363e37
SHA256aef594098919d8b321b12b3562852366c7ad0d3d3d64bd136a759825a4fc0505
SHA512c253697209454b23955710965dcdf058963d64cd92a083364e6d9bbee2518afb5c82b0996471b6c576c818be1de07ce6f6836bd236ee79d7eb8d7cd09f09b729
-
Filesize
45KB
MD5a09c4c7f1bde3344a4c00107aa6647c1
SHA17a29d65f0df668c14f216b49338b101821acc076
SHA2562ebe31d6b3a8955408f930f3e6ebc3f3b0bcd9f7ff38e23342bdd93bf573e17a
SHA5128ca548589551fabc3ac9e36c29a1f7e1b68dd7d32d9d802cb30b39521e3512a428ac9146528ee7524de234fb57a22d972002f279e66758abbded70c5d8391eba
-
Filesize
54KB
MD5c4dea2f26297a9de6dd907c06f82bde3
SHA1653397ddea1a9995274433165657aa747f302a36
SHA2561b09106e7bc128f7422b21165660b19043d86d119a9827adf833a2111526cbec
SHA512cfd6eea057866a7ec982ca3df8e2484f3a52352a6b7df020d1fba995a624f8a656d732204b1a466273fe70d72fb80b83601132d98f8f1a7edb0ebed65027871f
-
Filesize
36KB
MD5fdd34b68a759de820371118ad21e8efd
SHA1f5f66c26b6d9a7159993e930dadf7fe3990342f2
SHA2568bc4d0dc24c057f09401601c719a4b065712b11b474543888eee7a806c547a8a
SHA512a8e928cd1f8778b36202c05222744267f8cafcb5886168fa8a6d4292ca84fe816b715d08cf6183bfdc630d098fb901f14f1c5f058c17180ad33cf0c6bb074a8c
-
Filesize
17KB
MD59aa2f31f65b7f2d80108fa9601a53bdd
SHA1e2e4a7125eff47ad2b77989112c7642954850ce7
SHA256a036479f3af479ca3cc1cd86c598539a27b06e1e876031b068ae275b210d74fc
SHA512de3878177b4a7b78cd8552d4bfeac9054cd7fc8bd28c46af26a62023b823744bdf20a1f5ecb5247eb260cbf7e7ccd750e97b9b62943a3491f9ad55dccf362ac0
-
Filesize
350KB
MD5803df907d936e08fbbd06020c411be93
SHA14aa4b498ae037a2b0479659374a5c3af5f6b8d97
SHA256e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c
SHA5125b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532