Overview
overview
10Static
static
7Ransomware.Hive.zip
windows7-x64
1Ransomware.Hive.zip
windows10-1703-x64
1211xahcou.exe
windows7-x64
10211xahcou.exe
windows10-1703-x64
10Hive.elf
windows7-x64
3Hive.elf
windows10-1703-x64
3hive.exe
windows7-x64
10hive.exe
windows10-1703-x64
10hive_linux_elf
windows7-x64
1hive_linux_elf
windows10-1703-x64
1linux_hive.elf
windows7-x64
3linux_hive.elf
windows10-1703-x64
3sjl8j6ap3.exe
windows7-x64
1sjl8j6ap3.exe
windows10-1703-x64
1windows_25...c5.exe
windows7-x64
10windows_25...c5.exe
windows10-1703-x64
10zi1ysv64h.exe
windows7-x64
10zi1ysv64h.exe
windows10-1703-x64
10Analysis
-
max time kernel
82s -
max time network
195s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
12-02-2024 06:38
Behavioral task
behavioral1
Sample
Ransomware.Hive.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Ransomware.Hive.zip
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
211xahcou.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
211xahcou.exe
Resource
win10-20231215-en
Behavioral task
behavioral5
Sample
Hive.elf
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Hive.elf
Resource
win10-20231215-en
Behavioral task
behavioral7
Sample
hive.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
hive.exe
Resource
win10-20231215-en
Behavioral task
behavioral9
Sample
hive_linux_elf
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
hive_linux_elf
Resource
win10-20231215-en
Behavioral task
behavioral11
Sample
linux_hive.elf
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
linux_hive.elf
Resource
win10-20231215-en
Behavioral task
behavioral13
Sample
sjl8j6ap3.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
sjl8j6ap3.exe
Resource
win10-20231215-en
Behavioral task
behavioral15
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win10-20231215-en
Behavioral task
behavioral17
Sample
zi1ysv64h.exe
Resource
win7-20231215-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-655921741-723621465-1580683668-1000\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 10 IoCs
resource yara_rule behavioral8/memory/3948-0-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-1-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-2-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-1964-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-4525-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-6146-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-8419-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-12246-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-15346-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go behavioral8/memory/3948-19821-0x0000000000DD0000-0x0000000001033000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Drivers directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\de-DE\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\es-ES\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-655921741-723621465-1580683668-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.x6unTWrSUhAEsCdtUvu6JjN1FSETafUWYFURLk3m9Do.hive hive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral8/memory/3948-0-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-1-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-2-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-1964-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-4525-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-6146-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-8419-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-12246-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-15346-0x0000000000DD0000-0x0000000001033000-memory.dmp upx behavioral8/memory/3948-19821-0x0000000000DD0000-0x0000000001033000-memory.dmp upx -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Admin\Music\desktop.ini hive.exe File opened for modification C:\Users\Admin\Searches\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Public\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini hive.exe File opened for modification C:\Users\Admin\Links\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini hive.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Program Files (x86)\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Documents\desktop.ini hive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-655921741-723621465-1580683668-1000\desktop.ini hive.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu Places\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\desktop.ini hive.exe File opened for modification C:\Users\Public\Desktop\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_LogResource\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\sysprep\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmusrk1.inf_amd64_ae5b829575ed1ac2\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prngeclv.inf_amd64_5626f47f96e3c55b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\dc21x4vm.inf_amd64_0e1cf7c50ca4ffaa\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\halextintclpiodma.inf_amd64_680643dfb91b549e\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wiaca00j.inf_amd64_2b730d5c3b5d1ba1\amd64\MX430\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TrustedPlatformModule\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\intelpep.inf_amd64_25ac628c5c091267\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\usbprint.inf_amd64_fe8f8b86e7fa26d1\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WaitForAll\ja-JP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\wbem\xml\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetSecurity\fr\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\XPSViewer\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_fsquotamgmt.inf_amd64_0e90a152dac6ed91\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_holographic.inf_amd64_6175a4e1e40d6b1e\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netefe3e.inf_amd64_7830581a689ef40d\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netrndis.inf_amd64_b32102a0c2920c07\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_barcodescanner.inf_amd64_6f4168b229083c49\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\LogFiles\WMI\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_EnvironmentResource\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetTCPIP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migration\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Configuration\Registration\MSFT_FileDirectoryConfiguration\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetLbfo\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Configuration\Registration\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\rdpbus.inf_amd64_9e4fd69bbfb40126\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetQos\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TrustedPlatformModule\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_ArchiveResource\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmairte.inf_amd64_924b5a11fc6fb755\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmjf56e.inf_amd64_708bf820d108f94f\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\ntprint4.inf_amd64_c323277c1f851119\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\catroot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmcm28.inf_amd64_04957cd63cfa547e\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\es-ES\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Com\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netwew01.inf_amd64_84bf249d7c59a58c\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WinMetadata\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TrustedPlatformModule\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netrast.inf_amd64_4cb54c0a7bb0fae1\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netl260a.inf_amd64_783312763f8749c7\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Tasks\Microsoft\Windows\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Utility\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_UserResource\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\pt-PT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\compositebus.inf_amd64_de4c68ea4fb1be53\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmusrf.inf_amd64_c6311588881cb3a0\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\oobe\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Configuration\Schema\MSFT_FileDirectoryConfiguration\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\MSDRM\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RegistryResource\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\DiagSvcs\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\pmem.inf_amd64_20c469318128a4bd\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\tdibth.inf_amd64_eddbee87e538acd3\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\DiagSvcs\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmmod.inf_amd64_2a131294b3b6a2e9\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms007.inf_amd64_445baef28ad35ddf\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\msports.inf_amd64_05d977a8d9cb7c99\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\SHARED\res\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_LogResource\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\downlevel\HOW_TO_DECRYPT.txt hive.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ppd.xrm-ms.x6unTWrSUhAEsCdtUvu6JpsUQt_r28MElVNsuG_yVxY.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\rtcimm.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\2653_32x32x32.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\find-text.png.x6unTWrSUhAEsCdtUvu6Js2JubMKMOca3_yb6bJ-ag0.hive hive.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\management.properties hive.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages.properties hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\_Resources\11.rsrc hive.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\pictureinpicture@mozilla.org.xpi.x6unTWrSUhAEsCdtUvu6JmDarVeBnLYgWfmlk42d_SU.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\main.css.x6unTWrSUhAEsCdtUvu6JvqAR-_s5aVd7m8jxN4UOng.hive hive.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\jmxremote.access hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-16.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.DailyChallenges\Assets\badge-animation_2.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Delete.White.png.x6unTWrSUhAEsCdtUvu6Jkjq4ANel_5cdRsxZO-8GXg.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\stop_collection_data.gif.x6unTWrSUhAEsCdtUvu6JkERF9Z_3dkpRIeDnZnrMgc.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_Grace-ul-oob.xrm-ms hive.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1612.10312.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-white_scale-100.png.x6unTWrSUhAEsCdtUvu6Jo_y1JglAW4A_veBM0QPflk.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_ReptileEye.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_x64__8wekyb3d8bbwe\Assets\OneConnectAppList.targetsize-64.png hive.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\bun.png.x6unTWrSUhAEsCdtUvu6JlZT7WNirwYmsAnIlrQmQEc.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ChronologicalResume.dotx hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_neutral_resources.scale-200_8wekyb3d8bbwe\Assets\contrast-white\Movie-TVStoreLogo.scale-200_contrast-white.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\[email protected] hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationCore.resources.dll hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RIPPLE\THMBNAIL.PNG hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\animations\OneNoteFRE_SaveAutomatically_RTL_Tablet.mp4 hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_neutral_resources.scale-125_8wekyb3d8bbwe\Assets\contrast-white\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\variant.js.x6unTWrSUhAEsCdtUvu6Jk33CKQwhCguIxhtpNy_RWA.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\AppxSignature.p7x hive.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\onenote.x-none.msi.16.x-none.tree.dat.x6unTWrSUhAEsCdtUvu6Jqp_bQpgNDhaSe1NObCBAic.hive hive.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\3009_32x32x32.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\rhp_world_icon_hover.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Livetiles\MicrosoftSolitaireAppList.targetsize-40_altform-unplated.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\PopUp\Pop_up_i.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-24_altform-unplated_contrast-white.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\MapsStoreLogo.scale-125.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\Assets\PeopleAppStoreLogo.scale-200.png hive.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\uninstall.log.x6unTWrSUhAEsCdtUvu6JuZvofMvKP1U5kFPo9LLykM.hive hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_flat_10_000000_40x100.png.x6unTWrSUhAEsCdtUvu6JsMA0zXkb3hx5yoU84CjKTE.hive hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\view.html.x6unTWrSUhAEsCdtUvu6JpEu5fWnTic91CEwhHpqjAY.hive hive.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ul-oob.xrm-ms hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml hive.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\System.Workflow.Runtime.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\am_16x11.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\ui-strings.js hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_MAK_AE-ul-phn.xrm-ms hive.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\PhotoAcq.dll.mui hive.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\tipresx.dll.mui hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\vccorlib140.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\10178_20x20x32.png hive.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\nl.pak.x6unTWrSUhAEsCdtUvu6JgmJQLh2eTQEcIatuN0AvFI.hive hive.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ACEXBE.DLL hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-ppd.xrm-ms.x6unTWrSUhAEsCdtUvu6JtZ3yI5f6Fl2ZGPLZTpWw2Y.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\resources.pri hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-100.png.x6unTWrSUhAEsCdtUvu6Jrpkgk-kPJ9Mc4BRbwNBxiQ.hive hive.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\InfusedApps\Packages\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Utilities.v4.0.resources\v4.0_4.0.0.0_ja_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Cmdletization.OData\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Transactions.Bridge.Dtc.resources\v4.0_4.0.0.0_es_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\AppPatch\apppatch64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\LiveKernelReports\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CertificateServices.PKIClient.Cmdlets.Resources\v4.0_10.0.0.0_de_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsFeedbackHub_1.1612.10312.0_neutral_split.scale-125_8wekyb3d8bbwe\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsStore_11701.1001.87.0_neutral_split.scale-100_8wekyb3d8bbwe\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Regasm.resources\v4.0_4.0.0.0_ja_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.SDHost\v4.0_10.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Branding\Basebrd\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management.Resources\v4.0_10.0.0.0_fr_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics.Resources\v4.0_3.0.0.0_it_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.DSC.CoreConfProviders\v4.0_3.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Regasm.resources\v4.0_4.0.0.0_de_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xaml\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System\Speech\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ImmersiveControlPanel\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\GamePlayAssets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v3.5\1041\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.ApplicationId.Framework\v4.0_10.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation.Resources\v4.0_3.0.0.0_fr_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Threading\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Diagnostics.Tools\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Resources\Maps\font\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy\microsoft.system.package.metadata\Autogen\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\Grammar\080a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Western\mask\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\pages\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.Appx.PackageManager.Commands\v4.0_10.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Fireworks\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Tpm\v4.0_10.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v3.5\1040\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.WindowsSearch.Commands.Resources\v4.0_10.0.0.0_es_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel.services.resources\v4.0_4.0.0.0_ja_b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\PERFLIB\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.WindowsStore_11701.1001.87.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Activities.Build\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework.AeroLite\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemResources\Windows.UI.Logon\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\DigitalLocker\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.OneConnect_2.1701.277.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationClient.resources\v4.0_4.0.0.0_de_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Frameworks\Microsoft.NET.Native.Framework.1.3_1.3.24201.0_x64__8wekyb3d8bbwe\AppxMetadata\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\sr-Latn-RS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem.resources\v4.0_4.0.0.0_es_b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.Http.WebRequest.resources\v4.0_4.0.0.0_es_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.DurableInstancing\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\css\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\pt-PT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Data Provider for SqlServer\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Activities.Presentation\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Channels.resources\v4.0_4.0.0.0_ja_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.ModalSharePickerHost_cw5n1h2txyewy\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\InfusedApps\Packages\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\GamePlayAssets\TriPeaks\HOW_TO_DECRYPT.txt hive.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 2156 timeout.exe 3748 timeout.exe 3116 timeout.exe 4384 timeout.exe 4636 timeout.exe 828 timeout.exe 3088 timeout.exe 964 timeout.exe 1412 timeout.exe 1404 timeout.exe 4392 timeout.exe 2132 timeout.exe 2164 timeout.exe 3064 timeout.exe 2644 timeout.exe 3632 timeout.exe 4024 timeout.exe 1740 timeout.exe 4860 timeout.exe 4448 timeout.exe 3640 timeout.exe 3836 timeout.exe 292 timeout.exe 2180 timeout.exe 3552 timeout.exe 824 timeout.exe 3376 timeout.exe 2188 timeout.exe 344 timeout.exe 4660 timeout.exe 4144 timeout.exe 3184 timeout.exe 520 timeout.exe 2280 timeout.exe 1980 timeout.exe 2964 timeout.exe 2748 timeout.exe 928 timeout.exe 2960 timeout.exe 4964 timeout.exe 4800 timeout.exe 2644 timeout.exe 4448 timeout.exe 584 timeout.exe 1156 timeout.exe 4560 timeout.exe 4344 timeout.exe 2644 timeout.exe 1092 timeout.exe 1932 timeout.exe 1752 timeout.exe 4696 timeout.exe 1792 timeout.exe 2956 timeout.exe 3644 timeout.exe 768 timeout.exe 1868 timeout.exe 692 timeout.exe 2132 timeout.exe 2304 timeout.exe 4472 timeout.exe 2356 timeout.exe 4248 timeout.exe 4228 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2464 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-655921741-723621465-1580683668-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3948 hive.exe 3948 hive.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeBackupPrivilege 2336 vssvc.exe Token: SeRestorePrivilege 2336 vssvc.exe Token: SeAuditPrivilege 2336 vssvc.exe Token: SeShutdownPrivilege 1060 explorer.exe Token: SeCreatePagefilePrivilege 1060 explorer.exe Token: SeShutdownPrivilege 1060 explorer.exe Token: SeCreatePagefilePrivilege 1060 explorer.exe Token: SeShutdownPrivilege 1060 explorer.exe Token: SeCreatePagefilePrivilege 1060 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 1864 3948 hive.exe 74 PID 3948 wrote to memory of 1864 3948 hive.exe 74 PID 3948 wrote to memory of 1864 3948 hive.exe 74 PID 3948 wrote to memory of 168 3948 hive.exe 75 PID 3948 wrote to memory of 168 3948 hive.exe 75 PID 3948 wrote to memory of 168 3948 hive.exe 75 PID 1864 wrote to memory of 928 1864 cmd.exe 78 PID 1864 wrote to memory of 928 1864 cmd.exe 78 PID 1864 wrote to memory of 928 1864 cmd.exe 78 PID 168 wrote to memory of 2464 168 cmd.exe 79 PID 168 wrote to memory of 2464 168 cmd.exe 79 PID 168 wrote to memory of 2464 168 cmd.exe 79 PID 1864 wrote to memory of 2180 1864 cmd.exe 81 PID 1864 wrote to memory of 2180 1864 cmd.exe 81 PID 1864 wrote to memory of 2180 1864 cmd.exe 81 PID 1864 wrote to memory of 1752 1864 cmd.exe 82 PID 1864 wrote to memory of 1752 1864 cmd.exe 82 PID 1864 wrote to memory of 1752 1864 cmd.exe 82 PID 1864 wrote to memory of 4660 1864 cmd.exe 83 PID 1864 wrote to memory of 4660 1864 cmd.exe 83 PID 1864 wrote to memory of 4660 1864 cmd.exe 83 PID 1864 wrote to memory of 2132 1864 cmd.exe 84 PID 1864 wrote to memory of 2132 1864 cmd.exe 84 PID 1864 wrote to memory of 2132 1864 cmd.exe 84 PID 1864 wrote to memory of 4696 1864 cmd.exe 85 PID 1864 wrote to memory of 4696 1864 cmd.exe 85 PID 1864 wrote to memory of 4696 1864 cmd.exe 85 PID 1864 wrote to memory of 2392 1864 cmd.exe 86 PID 1864 wrote to memory of 2392 1864 cmd.exe 86 PID 1864 wrote to memory of 2392 1864 cmd.exe 86 PID 1864 wrote to memory of 1156 1864 cmd.exe 87 PID 1864 wrote to memory of 1156 1864 cmd.exe 87 PID 1864 wrote to memory of 1156 1864 cmd.exe 87 PID 1864 wrote to memory of 3364 1864 cmd.exe 88 PID 1864 wrote to memory of 3364 1864 cmd.exe 88 PID 1864 wrote to memory of 3364 1864 cmd.exe 88 PID 1864 wrote to memory of 4560 1864 cmd.exe 89 PID 1864 wrote to memory of 4560 1864 cmd.exe 89 PID 1864 wrote to memory of 4560 1864 cmd.exe 89 PID 1864 wrote to memory of 2184 1864 cmd.exe 90 PID 1864 wrote to memory of 2184 1864 cmd.exe 90 PID 1864 wrote to memory of 2184 1864 cmd.exe 90 PID 1864 wrote to memory of 4344 1864 cmd.exe 91 PID 1864 wrote to memory of 4344 1864 cmd.exe 91 PID 1864 wrote to memory of 4344 1864 cmd.exe 91 PID 1864 wrote to memory of 2188 1864 cmd.exe 92 PID 1864 wrote to memory of 2188 1864 cmd.exe 92 PID 1864 wrote to memory of 2188 1864 cmd.exe 92 PID 1864 wrote to memory of 2644 1864 cmd.exe 93 PID 1864 wrote to memory of 2644 1864 cmd.exe 93 PID 1864 wrote to memory of 2644 1864 cmd.exe 93 PID 1864 wrote to memory of 4800 1864 cmd.exe 94 PID 1864 wrote to memory of 4800 1864 cmd.exe 94 PID 1864 wrote to memory of 4800 1864 cmd.exe 94 PID 1864 wrote to memory of 4472 1864 cmd.exe 95 PID 1864 wrote to memory of 4472 1864 cmd.exe 95 PID 1864 wrote to memory of 4472 1864 cmd.exe 95 PID 1864 wrote to memory of 4384 1864 cmd.exe 96 PID 1864 wrote to memory of 4384 1864 cmd.exe 96 PID 1864 wrote to memory of 4384 1864 cmd.exe 96 PID 1864 wrote to memory of 1092 1864 cmd.exe 97 PID 1864 wrote to memory of 1092 1864 cmd.exe 97 PID 1864 wrote to memory of 1092 1864 cmd.exe 97 PID 1864 wrote to memory of 768 1864 cmd.exe 98 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Drops file in Drivers directory
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c hive.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:928
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2180
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1752
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4660
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2132
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4696
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2392
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1156
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3364
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4560
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2184
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4344
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2188
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2644
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4800
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4472
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4384
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1092
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:768
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4144
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4636
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1740
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3552
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1932
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2132
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1404
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2356
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4044
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2164
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4860
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2304
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2644
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:344
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4392
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2156
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2280
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:824
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3320
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:828
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4448
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1868
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3088
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1792
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:584
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3064
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3376
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4248
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4448
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2644
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3640
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:692
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3184
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3836
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3644
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:520
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3116
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3632
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1412
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:292
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4228
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2464
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4428
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.x6unTWrSUhAEsCdtUvu6JhoEb13PG9AIHlqq24qs3j4.hive
Filesize580KB
MD511bde8ba1d96eddb3d6a362d7a9e70bb
SHA1374e4a9ef719b828ccfff41a564c78aa12b317eb
SHA256b0e94ca6bf70e4db42b814e54a69e73a5555477989ba62cf0954985b3331619f
SHA512a297afa1199a7aa023bdc735957cbec988cd9128b3ff10d5480ae6148d5435d8c05035482a16413924791d30ef345b3b65e962c9c73f0f476b0c08fa5b5a7e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db.x6unTWrSUhAEsCdtUvu6Jtp1vLdYMpl9WiQ8P4dAsDo.hive
Filesize412KB
MD5b92d5fcd6e5ff24df568303d6ce17a19
SHA10df7b21eaec91b486005d3cafd3847819c4833b2
SHA2567d02fa3d2d9a176552f130376e43b3c6d01c9ae7bba706531b7671459cb57149
SHA5124735de1c1d2078e0edb64dbf0a092e91871ce28b76a2ceee29f81f2e7cea1e800a877c4aa8fa648562c7bd3bd1505f101a2d4e02e8ff572833a921ae38a80e39
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db.x6unTWrSUhAEsCdtUvu6JqJzaZqj7YI_YzY1fTQWEHA.hive
Filesize14KB
MD56c859786df6ad1f3a7d8089009a02d2f
SHA1eaa2fb3ad71fed46d7226b658d49ccf2b79f13f5
SHA2560cb422f5616cc5a868aeb43b5ec3ecbce8f50d0202f23ce0f982199ebd58bdba
SHA512468d36602e012baba1a9897f4345236c486e15f1a11622324a06dac42da9db8fb40ac9c9c78ee972ecc895513a656b6c387ca9a45244bfb1b7412b12b4f24687
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d
-
Filesize
1KB
MD580207d0f8ea42bdfeaf9f5c586230aca
SHA1747481fe2b0b6d81c3b19ba62d1e49eab6a5461f
SHA25625edefb3b0678dfe0d927ff48ce67254359ba379df9468f634d02c026f0e7131
SHA51273f68ce9e98d2346be1762bd54bb06ef83ae939dfbcf9b786d9b773fa454352613387d264b7a87a1c08950226553817bf01f5aa4107bc12de36a1689e2137304