Resubmissions
23-02-2024 11:31
240223-nm1jwsfc9v 123-02-2024 11:30
240223-nmex7afc8t 323-02-2024 00:21
240223-anpbcshc73 822-02-2024 20:41
240222-zgssmseh9w 10Analysis
-
max time kernel
1200s -
max time network
1205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
WhatsApp Image 2024-02-22 at 18.48.42.jpg
Resource
win10v2004-20240221-en
General
-
Target
WhatsApp Image 2024-02-22 at 18.48.42.jpg
-
Size
275KB
-
MD5
65fbd7e8560a33804c5fef01fbf1031a
-
SHA1
ec1dd94fa010f3f870bbdad28f0ac1c196d085b7
-
SHA256
3f2d3f804b2ec5bd87c6facac593090ca47553e8f9a824c9911ad840b61cc113
-
SHA512
1bfc9edb18260dc5c268bd620f6b5de7fc30fff36d0d9e7fab5387760a7b8231172a91c1c08ee1ca771ebca365dfb047eca0e19be0727a46827353f63e133853
-
SSDEEP
6144:bxAACWr/TO73Nnjrk4rp4kL02lZbctlepL+Cy/j/zGjd4Utbtqqi2rH1Dbf:bmACW+pok4kLtZbc7Gz4g4+rrVvf
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___C20DWOIS_.txt
cerber
http://p27dokhpz2n7nvgr.onion/F378-3542-4B6D-0446-96B0
http://p27dokhpz2n7nvgr.12hygy.top/F378-3542-4B6D-0446-96B0
http://p27dokhpz2n7nvgr.14ewqv.top/F378-3542-4B6D-0446-96B0
http://p27dokhpz2n7nvgr.14vvrc.top/F378-3542-4B6D-0446-96B0
http://p27dokhpz2n7nvgr.129p1t.top/F378-3542-4B6D-0446-96B0
http://p27dokhpz2n7nvgr.1apgrn.top/F378-3542-4B6D-0446-96B0
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___UQWVK_.hta
cerber
Extracted
crimsonrat
185.136.161.124
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
CrimsonRAT main payload 1 IoCs
resource yara_rule behavioral1/files/0x00060000000233be-1331.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 4092 created 4616 4092 taskmgr.exe 305 PID 4092 created 4616 4092 taskmgr.exe 305 -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/6096-1421-0x0000000000400000-0x00000000004ED000-memory.dmp xmrig -
Contacts a large (1141) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 636 netsh.exe 5008 netsh.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation CrimsonRAT (1).exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation CrimsonRAT (1).exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation cerber.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation CrimsonRAT (1).exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\International\Geo\Nation msedge.exe -
Cryptocurrency Miner
Makes network request to known mining pool URL.
-
Drops startup file 10 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rTErod.url Ransomware.Unnamed_0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rTErod.url Ransomware.Unnamed_0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rTErod.url Ransomware.Unnamed_0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rTErod.url Ransomware.Unnamed_0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rTErod.url Ransomware.Unnamed_0.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ cerber.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rTErod.url Ransomware.Unnamed_0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD920F.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD9216.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rTErod.url Ransomware.Unnamed_0.exe -
Executes dropped EXE 64 IoCs
pid Process 440 cerber.exe 3272 cerber.exe 3080 msedge.exe 4892 msedge.exe 1444 msedge.exe 4448 msedge.exe 5008 msedge.exe 1376 dlrarhsiva.exe 6056 taskdl.exe 5880 @[email protected] 5680 @[email protected] 2700 taskhsvc.exe 4028 taskdl.exe 2296 taskse.exe 4868 @[email protected] 4612 taskdl.exe 1676 taskse.exe 6120 @[email protected] 5212 @[email protected] 4604 taskdl.exe 6012 taskse.exe 5656 @[email protected] 4616 @[email protected] 1488 taskse.exe 1112 @[email protected] 5036 taskdl.exe 5204 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 2636 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 6056 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 5676 Ransomware.Unnamed_0.exe 2792 Ransomware.Unnamed_0.exe 5624 taskse.exe 4216 @[email protected] 3556 taskdl.exe 5976 Ransomware.Unnamed_0.exe 4732 taskse.exe 5384 @[email protected] 4640 taskdl.exe 5812 msedge.exe 5720 msedge.exe 2008 CrimsonRAT (1).exe 2732 CrimsonRAT (1).exe 1828 dlrarhsiva.exe 5224 CrimsonRAT (1).exe 5752 dlrarhsiva.exe 3064 dlrarhsiva.exe 2816 taskse.exe 3032 @[email protected] 3136 taskdl.exe 4136 msedge.exe 6100 msedge.exe 1880 taskse.exe 4216 @[email protected] 5316 taskdl.exe 636 taskse.exe 5084 @[email protected] 3948 taskdl.exe 1496 taskse.exe 6136 @[email protected] 4632 taskdl.exe 5564 taskse.exe 5660 @[email protected] 3972 taskdl.exe 3728 msedge.exe -
Loads dropped DLL 41 IoCs
pid Process 3080 msedge.exe 4892 msedge.exe 4892 msedge.exe 3080 msedge.exe 1444 msedge.exe 1444 msedge.exe 4448 msedge.exe 4448 msedge.exe 5008 msedge.exe 5008 msedge.exe 3228 Process not Found 3228 Process not Found 2700 taskhsvc.exe 2700 taskhsvc.exe 2700 taskhsvc.exe 2700 taskhsvc.exe 2700 taskhsvc.exe 2700 taskhsvc.exe 2700 taskhsvc.exe 5812 msedge.exe 5812 msedge.exe 5720 msedge.exe 5720 msedge.exe 4136 msedge.exe 4136 msedge.exe 6100 msedge.exe 6100 msedge.exe 3728 msedge.exe 3728 msedge.exe 440 msedge.exe 1240 msedge.exe 440 msedge.exe 1240 msedge.exe 6084 msedge.exe 4148 msedge.exe 4148 msedge.exe 6084 msedge.exe 5312 msedge.exe 5312 msedge.exe 5664 msedge.exe 5664 msedge.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 368 icacls.exe 2948 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/6096-1388-0x0000000000400000-0x00000000004ED000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\waLPMrixgj = "\"C:\\Users\\Admin\\AppData\\Local\\JESYXQ~1\\DHSDHC~1.EXE\"" vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qqacpqnwqsp929 = "\"C:\\Users\\Admin\\Desktop\\tasksche.exe\"" reg.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\Scanned Documents\desktop.ini WFS.exe File opened for modification C:\Users\Admin\Documents\Fax\Inbox\desktop.ini WFS.exe File opened for modification C:\Users\Admin\Documents\Fax\Drafts\desktop.ini WFS.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: xpaj (1).exe File opened (read-only) \??\u: xpaj (1).exe File opened (read-only) \??\x: xpaj (1).exe File opened (read-only) \??\I: ChilledWindows (2).exe File opened (read-only) \??\U: ChilledWindows (2).exe File opened (read-only) \??\g: xpaj (1).exe File opened (read-only) \??\K: ChilledWindows (2).exe File opened (read-only) \??\X: ChilledWindows (2).exe File opened (read-only) \??\o: xpaj (1).exe File opened (read-only) \??\A: ChilledWindows (2).exe File opened (read-only) \??\U: ChilledWindows (2).exe File opened (read-only) \??\B: ChilledWindows (2).exe File opened (read-only) \??\T: ChilledWindows (2).exe File opened (read-only) \??\V: ChilledWindows (2).exe File opened (read-only) \??\Y: ChilledWindows (2).exe File opened (read-only) \??\q: xpaj (1).exe File opened (read-only) \??\Q: ChilledWindows (2).exe File opened (read-only) \??\R: ChilledWindows (2).exe File opened (read-only) \??\G: ChilledWindows (2).exe File opened (read-only) \??\e: xpaj (1).exe File opened (read-only) \??\J: ChilledWindows (2).exe File opened (read-only) \??\A: ChilledWindows (2).exe File opened (read-only) \??\p: xpaj (1).exe File opened (read-only) \??\O: ChilledWindows (2).exe File opened (read-only) \??\i: xpaj (1).exe File opened (read-only) \??\H: ChilledWindows (2).exe File opened (read-only) \??\P: ChilledWindows (2).exe File opened (read-only) \??\E: ChilledWindows (2).exe File opened (read-only) \??\r: xpaj (1).exe File opened (read-only) \??\Z: ChilledWindows (2).exe File opened (read-only) \??\P: ChilledWindows (2).exe File opened (read-only) \??\S: ChilledWindows (2).exe File opened (read-only) \??\Z: ChilledWindows (2).exe File opened (read-only) \??\v: xpaj (1).exe File opened (read-only) \??\G: ChilledWindows (2).exe File opened (read-only) \??\M: ChilledWindows (2).exe File opened (read-only) \??\O: ChilledWindows (2).exe File opened (read-only) \??\h: xpaj (1).exe File opened (read-only) \??\I: ChilledWindows (2).exe File opened (read-only) \??\W: ChilledWindows (2).exe File opened (read-only) \??\N: ChilledWindows (2).exe File opened (read-only) \??\K: ChilledWindows (2).exe File opened (read-only) \??\N: ChilledWindows (2).exe File opened (read-only) \??\T: ChilledWindows (2).exe File opened (read-only) \??\M: ChilledWindows (2).exe File opened (read-only) \??\Q: ChilledWindows (2).exe File opened (read-only) \??\k: xpaj (1).exe File opened (read-only) \??\E: ChilledWindows (2).exe File opened (read-only) \??\J: ChilledWindows (2).exe File opened (read-only) \??\L: ChilledWindows (2).exe File opened (read-only) \??\R: ChilledWindows (2).exe File opened (read-only) \??\W: ChilledWindows (2).exe File opened (read-only) \??\l: xpaj (1).exe File opened (read-only) \??\y: xpaj (1).exe File opened (read-only) \??\X: ChilledWindows (2).exe File opened (read-only) \??\Y: ChilledWindows (2).exe File opened (read-only) \??\H: ChilledWindows (2).exe File opened (read-only) \??\m: xpaj (1).exe File opened (read-only) \??\w: xpaj (1).exe File opened (read-only) \??\S: ChilledWindows (2).exe File opened (read-only) \??\V: ChilledWindows (2).exe File opened (read-only) \??\j: xpaj (1).exe File opened (read-only) \??\B: ChilledWindows (2).exe File opened (read-only) \??\s: xpaj (1).exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 81 raw.githubusercontent.com 82 raw.githubusercontent.com 104 raw.githubusercontent.com 3402 camo.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 xpaj (1).exe File opened for modification \??\PHYSICALDRIVE0 xpaj (1).exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server cerber.exe -
Sets desktop wallpaper using registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp25C9.bmp" cerber.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3164 set thread context of 1572 3164 Ransomware.Unnamed_0.exe 232 PID 1116 set thread context of 6096 1116 Avoid.exe 233 PID 5524 set thread context of 5840 5524 Ransomware.Unnamed_0.exe 240 PID 3440 set thread context of 4452 3440 Ransomware.Unnamed_0.exe 245 PID 5784 set thread context of 2908 5784 Ransomware.Unnamed_0.exe 250 PID 5676 set thread context of 5224 5676 Ransomware.Unnamed_0.exe 329 PID 2792 set thread context of 1576 2792 Ransomware.Unnamed_0.exe 330 PID 5976 set thread context of 3560 5976 Ransomware.Unnamed_0.exe 340 PID 6004 set thread context of 2664 6004 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 395 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WWINTL.DLL xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\clrcompression.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-multibyte-l1-1-0.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\System.IdentityModel.Selectors.dll xpaj (1).exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VCCORLIB140_APP.DLL xpaj (1).exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icucnv58.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\npt.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.ServiceModel.Web.dll xpaj (1).exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe xpaj (1).exe File opened for modification C:\Program Files\Java\jre-1.8\bin\verify.dll xpaj (1).exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-synch-l1-1-0.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\msotd.exe xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Diagnostics.StackTrace.dll xpaj (1).exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\librotate_plugin.dll xpaj (1).exe File opened for modification C:\Program Files\Java\jre-1.8\bin\management.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl.dll xpaj (1).exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Security.Cryptography.Algorithms.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendar.App.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\clearkey.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.Royale.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\api-ms-win-core-libraryloader-l1-1-0.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Photos.Viewer.Sequence.dll xpaj (1).exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.183.29\msedgeupdateres_fi.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-synch-l1-2-0.dll xpaj (1).exe File opened for modification \??\c:\Program Files (x86)\Windows Mail\wab.exe xpaj (1).exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VCRUNTIME140_APP.DLL xpaj (1).exe File opened for modification C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-datetime-l1-1-0.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\RuntimeConfiguration.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE xpaj (1).exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.183.29\msedgeupdateres_quz.dll xpaj (1).exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-convert-l1-1-0.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\Office.UI.Xaml.HxShared.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\Microsoft.PackageManagement.resources.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.183.29\msedgeupdateres_fil.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_nl.dll xpaj (1).exe File opened for modification C:\Program Files\Microsoft Office\root\Client\mfc140u.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Xml.Linq.Resources.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\msdaprst.dll xpaj (1).exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libudp_plugin.dll xpaj (1).exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.Security.Principal.dll xpaj (1).exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libposterize_plugin.dll xpaj (1).exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libftp_plugin.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Common Files\System\ado\msadomd.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\mrt_map.dll xpaj (1).exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.Security.Principal.Windows.dll xpaj (1).exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.183.29\MicrosoftEdgeUpdateOnDemand.exe xpaj (1).exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Runtime.WindowsRuntime.UI.Xaml.dll xpaj (1).exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.Private.Xml.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\msdatasrc.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdatt.dll xpaj (1).exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpsychedelic_plugin.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\SensorFusionLib.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\vccorlib140.dll xpaj (1).exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_setid_plugin.dll xpaj (1).exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.183.29\msedgeupdateres_ko.dll xpaj (1).exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\de\Microsoft.PackageManagement.MetaProvider.PowerShell.resources.dll xpaj (1).exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\PRIVATE_ODBC32.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Java\jre-1.8\bin\keytool.exe xpaj (1).exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.IO.Pipes.dll xpaj (1).exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.Threading.dll xpaj (1).exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.Web.dll xpaj (1).exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-utility-l1-1-0.dll xpaj (1).exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketchAppService.dll xpaj (1).exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\ cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office cerber.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop cerber.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server cerber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 19 IoCs
pid pid_target Process procid_target 464 5204 WerFault.exe 312 5812 2636 WerFault.exe 315 3120 6056 WerFault.exe 318 948 5624 WerFault.exe 331 5176 4732 WerFault.exe 344 3624 2816 WerFault.exe 359 3948 3136 WerFault.exe 362 3496 1880 WerFault.exe 368 6028 5316 WerFault.exe 372 2816 636 WerFault.exe 377 768 3948 WerFault.exe 381 5908 1496 WerFault.exe 386 4032 4632 WerFault.exe 390 6060 5564 WerFault.exe 397 5016 3972 WerFault.exe 401 4248 1576 WerFault.exe 407 3168 5024 WerFault.exe 410 4180 4024 WerFault.exe 418 4968 5720 WerFault.exe 421 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Kills process with taskkill 1 IoCs
pid Process 4600 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3054445511-921769590-4013668107-1000\{3DD5E094-FB8E-44D3-BE45-1D13F1CF4849} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Local Settings cerber.exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3054445511-921769590-4013668107-1000\{1E028EC0-1161-465C-9D19-42EE3AC07264} ChilledWindows (2).exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3054445511-921769590-4013668107-1000\{EED34B00-F323-4EB8-806D-95D2D0379635} ChilledWindows (2).exe Key created \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000_Classes\Local Settings OpenWith.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 6124 reg.exe -
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:Updt_3or4kl4x13tuuug3Byamue2s4b:$DATA WFS.exe File opened for modification C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d}:$DATA WFS.exe File created C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:3or4kl4x13tuuug3Byamue2s4b:$DATA WFS.exe File opened for modification C:\Users\Admin\Documents\Scanned Documents\Welcome Scan.jpg\:Updt_3or4kl4x13tuuug3Byamue2s4b:$DATA WFS.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2632 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1880 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2988 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 1192 identity_helper.exe 1192 identity_helper.exe 2272 msedge.exe 2272 msedge.exe 660 msedge.exe 660 msedge.exe 1088 msedge.exe 1088 msedge.exe 4868 msedge.exe 4868 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 4540 msedge.exe 4540 msedge.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 4016 msedge.exe 4016 msedge.exe 5880 msedge.exe 5880 msedge.exe 5996 msedge.exe 5996 msedge.exe 6056 msedge.exe 6056 msedge.exe 5008 msedge.exe 5008 msedge.exe 3164 Ransomware.Unnamed_0.exe 3164 Ransomware.Unnamed_0.exe 3164 Ransomware.Unnamed_0.exe 1572 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2988 vlc.exe 4868 @[email protected] 4092 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 744 7zG.exe Token: 35 744 7zG.exe Token: SeSecurityPrivilege 744 7zG.exe Token: SeSecurityPrivilege 744 7zG.exe Token: SeShutdownPrivilege 440 cerber.exe Token: SeCreatePagefilePrivilege 440 cerber.exe Token: SeRestorePrivilege 2224 7zG.exe Token: 35 2224 7zG.exe Token: SeSecurityPrivilege 2224 7zG.exe Token: SeSecurityPrivilege 2224 7zG.exe Token: SeRestorePrivilege 2368 7zG.exe Token: 35 2368 7zG.exe Token: SeSecurityPrivilege 2368 7zG.exe Token: SeSecurityPrivilege 2368 7zG.exe Token: SeDebugPrivilege 4600 taskkill.exe Token: SeDebugPrivilege 5100 taskmgr.exe Token: SeSystemProfilePrivilege 5100 taskmgr.exe Token: SeCreateGlobalPrivilege 5100 taskmgr.exe Token: 33 5100 taskmgr.exe Token: SeIncBasePriorityPrivilege 5100 taskmgr.exe Token: SeShutdownPrivilege 3836 ChilledWindows (2).exe Token: SeCreatePagefilePrivilege 3836 ChilledWindows (2).exe Token: 33 2124 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2124 AUDIODG.EXE Token: SeShutdownPrivilege 3836 ChilledWindows (2).exe Token: SeCreatePagefilePrivilege 3836 ChilledWindows (2).exe Token: SeShutdownPrivilege 3836 ChilledWindows (2).exe Token: SeCreatePagefilePrivilege 3836 ChilledWindows (2).exe Token: SeShutdownPrivilege 6096 ChilledWindows (2).exe Token: SeCreatePagefilePrivilege 6096 ChilledWindows (2).exe Token: SeShutdownPrivilege 6096 ChilledWindows (2).exe Token: SeCreatePagefilePrivilege 6096 ChilledWindows (2).exe Token: 33 2988 vlc.exe Token: SeIncBasePriorityPrivilege 2988 vlc.exe Token: SeDebugPrivilege 3164 Ransomware.Unnamed_0.exe Token: SeDebugPrivilege 1572 vbc.exe Token: SeLockMemoryPrivilege 6096 notepad.exe Token: SeLockMemoryPrivilege 6096 notepad.exe Token: SeDebugPrivilege 5524 Ransomware.Unnamed_0.exe Token: SeDebugPrivilege 3440 Ransomware.Unnamed_0.exe Token: SeDebugPrivilege 5784 Ransomware.Unnamed_0.exe Token: SeIncreaseQuotaPrivilege 6108 WMIC.exe Token: SeSecurityPrivilege 6108 WMIC.exe Token: SeTakeOwnershipPrivilege 6108 WMIC.exe Token: SeLoadDriverPrivilege 6108 WMIC.exe Token: SeSystemProfilePrivilege 6108 WMIC.exe Token: SeSystemtimePrivilege 6108 WMIC.exe Token: SeProfSingleProcessPrivilege 6108 WMIC.exe Token: SeIncBasePriorityPrivilege 6108 WMIC.exe Token: SeCreatePagefilePrivilege 6108 WMIC.exe Token: SeBackupPrivilege 6108 WMIC.exe Token: SeRestorePrivilege 6108 WMIC.exe Token: SeShutdownPrivilege 6108 WMIC.exe Token: SeDebugPrivilege 6108 WMIC.exe Token: SeSystemEnvironmentPrivilege 6108 WMIC.exe Token: SeRemoteShutdownPrivilege 6108 WMIC.exe Token: SeUndockPrivilege 6108 WMIC.exe Token: SeManageVolumePrivilege 6108 WMIC.exe Token: 33 6108 WMIC.exe Token: 34 6108 WMIC.exe Token: 35 6108 WMIC.exe Token: 36 6108 WMIC.exe Token: SeIncreaseQuotaPrivilege 6108 WMIC.exe Token: SeSecurityPrivilege 6108 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 744 7zG.exe 2224 7zG.exe 2368 7zG.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 1116 Avoid.exe 2208 Avoid.exe 4136 Avoid.exe 3836 ChilledWindows (2).exe 6096 ChilledWindows (2).exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 5100 taskmgr.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe 4092 taskmgr.exe -
Suspicious use of SetWindowsHookEx 34 IoCs
pid Process 4952 OpenWith.exe 2568 WFS.exe 2568 WFS.exe 3216 OpenWith.exe 4028 OpenWith.exe 1756 OpenWith.exe 3628 OpenWith.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 2988 vlc.exe 6048 xpaj (1).exe 3932 xpaj (1).exe 5880 @[email protected] 5880 @[email protected] 5680 @[email protected] 5680 @[email protected] 4868 @[email protected] 4868 @[email protected] 6120 @[email protected] 5544 OpenWith.exe 5212 @[email protected] 5656 @[email protected] 4616 @[email protected] 4616 @[email protected] 1112 @[email protected] 1112 @[email protected] 4216 @[email protected] 5384 @[email protected] 3032 @[email protected] 4216 @[email protected] 5084 @[email protected] 6136 @[email protected] 5660 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 636 440 cerber.exe 143 PID 440 wrote to memory of 636 440 cerber.exe 143 PID 440 wrote to memory of 636 440 cerber.exe 143 PID 440 wrote to memory of 5008 440 cerber.exe 145 PID 440 wrote to memory of 5008 440 cerber.exe 145 PID 440 wrote to memory of 5008 440 cerber.exe 145 PID 440 wrote to memory of 4412 440 cerber.exe 150 PID 440 wrote to memory of 4412 440 cerber.exe 150 PID 440 wrote to memory of 4412 440 cerber.exe 150 PID 440 wrote to memory of 2632 440 cerber.exe 151 PID 440 wrote to memory of 2632 440 cerber.exe 151 PID 440 wrote to memory of 2632 440 cerber.exe 151 PID 440 wrote to memory of 2280 440 cerber.exe 153 PID 440 wrote to memory of 2280 440 cerber.exe 153 PID 440 wrote to memory of 2280 440 cerber.exe 153 PID 2280 wrote to memory of 4600 2280 cmd.exe 155 PID 2280 wrote to memory of 4600 2280 cmd.exe 155 PID 2280 wrote to memory of 4600 2280 cmd.exe 155 PID 2280 wrote to memory of 1880 2280 cmd.exe 157 PID 2280 wrote to memory of 1880 2280 cmd.exe 157 PID 2280 wrote to memory of 1880 2280 cmd.exe 157 PID 4464 wrote to memory of 2044 4464 msedge.exe 162 PID 4464 wrote to memory of 2044 4464 msedge.exe 162 PID 1380 wrote to memory of 1080 1380 msedge.exe 183 PID 1380 wrote to memory of 1080 1380 msedge.exe 183 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 PID 1380 wrote to memory of 5172 1380 msedge.exe 184 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 4596 attrib.exe 1636 attrib.exe 6108 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\WhatsApp Image 2024-02-22 at 18.48.42.jpg"1⤵PID:3268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9963346f8,0x7ff996334708,0x7ff9963347181⤵PID:4872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:21⤵PID:1948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:81⤵PID:4936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:11⤵PID:3824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:11⤵PID:1444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:11⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:11⤵PID:3168
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 /prefetch:81⤵PID:2632
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:11⤵PID:3636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:11⤵PID:3648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5556 /prefetch:81⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4176 /prefetch:81⤵PID:5092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:11⤵PID:4288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:11⤵PID:3260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:11⤵PID:3488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:11⤵PID:4448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:11⤵PID:5088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:11⤵PID:3248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:11⤵PID:2944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6588 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:11⤵PID:396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3412 /prefetch:81⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1708 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:660
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4952
-
C:\Windows\System32\WFS.exe"C:\Windows\System32\WFS.exe" /SendTo C:\Users\Admin\Desktop\WTEpZSFwgb1⤵
- Drops desktop.ini file(s)
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6744 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2380 /prefetch:11⤵PID:3568
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3216
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4028
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:11⤵PID:4248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6516 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Ransomware-Samples-main\Cerber\" -an -ai#7zMap23777:154:7zEvent276621⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:744
-
C:\Users\Admin\Desktop\Ransomware-Samples-main\Cerber\cerber.exe"C:\Users\Admin\Desktop\Ransomware-Samples-main\Cerber\cerber.exe"1⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
PID:636
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
PID:5008
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___L8DZ84_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:4412
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___UHLZEB_.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "cerber.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1880
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Ransomware-Samples-main\Cryptowall\" -an -ai#7zMap14164:170:7zEvent34971⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2224
-
C:\Users\Admin\Desktop\Ransomware-Samples-main\Cerber\cerber.exe"C:\Users\Admin\Desktop\Ransomware-Samples-main\Cerber\cerber.exe"1⤵
- Executes dropped EXE
PID:3272
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Ransomware-Samples-main\Jigsaw\" -an -ai#7zMap15879:154:7zEvent83391⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2368
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3628
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9963346f8,0x7ff996334708,0x7ff9963347182⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:11⤵PID:4948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:11⤵PID:884
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:11⤵PID:4268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1072 /prefetch:11⤵PID:940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:11⤵PID:3116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:11⤵PID:3496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:11⤵PID:468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:11⤵PID:4720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6116 /prefetch:81⤵PID:3144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault109807f2h77efh44c1h8a7fh9716865d3c831⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9963346f8,0x7ff996334708,0x7ff9963347182⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1484,651274027005803014,9565149116155597276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1484,651274027005803014,9565149116155597276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault7a8f2ab1hf50ah42bfha88fh30992dc762341⤵PID:5356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9963346f8,0x7ff996334708,0x7ff9963347182⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1388,3684198891026293840,3479851282859125483,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1388,3684198891026293840,3479851282859125483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:11⤵PID:5840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7140 /prefetch:11⤵PID:6064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6396 /prefetch:81⤵PID:5200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7228 /prefetch:81⤵PID:5252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7268 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
C:\Users\Admin\Downloads\Avoid.exe"C:\Users\Admin\Downloads\Avoid.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
PID:1116 -
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\Users\Admin\AppData\Local\JesYXqkYNx\cfg"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:6096
-
-
C:\Users\Admin\Downloads\Avoid.exe"C:\Users\Admin\Downloads\Avoid.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:2208
-
C:\Users\Admin\Downloads\Avoid.exe"C:\Users\Admin\Downloads\Avoid.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:4136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7460 /prefetch:11⤵PID:5288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:11⤵PID:5224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7068 /prefetch:81⤵PID:2236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7576 /prefetch:11⤵PID:5156
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6832 /prefetch:81⤵PID:1572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7944 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:5880
-
C:\Users\Admin\Downloads\ChilledWindows (2).exe"C:\Users\Admin\Downloads\ChilledWindows (2).exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3836
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x478 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:11⤵PID:2428
-
C:\Users\Admin\Downloads\ChilledWindows (2).exe"C:\Users\Admin\Downloads\ChilledWindows (2).exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7296 /prefetch:11⤵PID:2056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7672 /prefetch:81⤵PID:2220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1276 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\chilledwindows.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:11⤵PID:4572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1276 /prefetch:81⤵PID:2664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:11⤵PID:5288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7676 /prefetch:81⤵PID:1876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:6056
-
C:\Users\Admin\Downloads\xpaj (1).exe"C:\Users\Admin\Downloads\xpaj (1).exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:6048
-
C:\Users\Admin\Downloads\xpaj (1).exe"C:\Users\Admin\Downloads\xpaj (1).exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:3932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7800 /prefetch:11⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7388 /prefetch:81⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=76 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:11⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4924 /prefetch:81⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7308 /prefetch:81⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
C:\Users\Admin\Downloads\CrimsonRAT (1).exe"C:\Users\Admin\Downloads\CrimsonRAT (1).exe"1⤵PID:3240
-
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"2⤵
- Executes dropped EXE
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Unnamed_0.zip\Ransomware.Unnamed_0.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Unnamed_0.zip\Ransomware.Unnamed_0.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\t50yo0un\t50yo0un.cmdline"2⤵PID:5548
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9351.tmp" "c:\Users\Admin\AppData\Local\Temp\t50yo0un\CSCC85F17F1F4FC4663A37E01BDF426D24.TMP"3⤵PID:2080
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0a5gxxfz\0a5gxxfz.cmdline"2⤵PID:5624
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE48E.tmp" "c:\Users\Admin\AppData\Local\Temp\0a5gxxfz\CSCACE7099299B148C4BD74DB8F238B4AFD.TMP"3⤵PID:2220
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:5840
-
-
C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nwrvebf3\nwrvebf3.cmdline"2⤵PID:5288
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3FD.tmp" "c:\Users\Admin\AppData\Local\Temp\nwrvebf3\CSC56FBF4A91C064783B550D5A3C32598C7.TMP"3⤵PID:3088
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:4452
-
-
C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\45ijkqlc\45ijkqlc.cmdline"2⤵PID:5600
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES96C.tmp" "c:\Users\Admin\AppData\Local\Temp\45ijkqlc\CSC780B9DF2E6E4490584FEDB5D4E718928.TMP"3⤵PID:5036
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:2908
-
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious use of SetThreadContext
PID:6004 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
PID:4596
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:368
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 173601708635319.bat2⤵PID:5700
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵PID:3556
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- Views/modifies file attributes
PID:1636
-
-
C:\Users\Admin\Desktop\@[email protected]PID:5880
-
C:\Users\Admin\Desktop\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exePID:2864
-
C:\Users\Admin\Desktop\@[email protected]PID:5680
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:5560
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:6108
-
-
-
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4028
-
-
C:\Users\Admin\Desktop\taskse.exePID:2296
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "qqacpqnwqsp929" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f2⤵PID:2220
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "qqacpqnwqsp929" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:6124
-
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4612
-
-
C:\Users\Admin\Desktop\taskse.exePID:1676
-
-
C:\Users\Admin\Desktop\@[email protected]PID:6120
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4604
-
-
C:\Users\Admin\Desktop\taskse.exePID:6012
-
-
C:\Users\Admin\Desktop\@[email protected]PID:5656
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
C:\Users\Admin\Desktop\taskse.exePID:1488
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5036
-
-
C:\Users\Admin\Desktop\taskse.exePID:5624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5624 -s 2963⤵
- Program crash
PID:948
-
-
-
C:\Users\Admin\Desktop\@[email protected]PID:4216
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3556
-
-
C:\Users\Admin\Desktop\@[email protected]PID:5384
-
-
C:\Users\Admin\Desktop\taskse.exePID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 2963⤵
- Program crash
PID:5176
-
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4640
-
-
C:\Users\Admin\Desktop\@[email protected]PID:3032
-
-
C:\Users\Admin\Desktop\taskse.exePID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2963⤵
- Program crash
PID:3624
-
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 2403⤵
- Program crash
PID:3948
-
-
-
C:\Users\Admin\Desktop\taskse.exePID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 2963⤵
- Program crash
PID:3496
-
-
-
C:\Users\Admin\Desktop\@[email protected]PID:4216
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 2403⤵
- Program crash
PID:6028
-
-
-
C:\Users\Admin\Desktop\taskse.exePID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 2963⤵
- Program crash
PID:2816
-
-
-
C:\Users\Admin\Desktop\@[email protected]PID:5084
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 2363⤵
- Program crash
PID:768
-
-
-
C:\Users\Admin\Desktop\taskse.exePID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 2963⤵
- Program crash
PID:5908
-
-
-
C:\Users\Admin\Desktop\@[email protected]PID:6136
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 2363⤵
- Program crash
PID:4032
-
-
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\Users\Admin\AppData\Local\JesYXqkYNx\cfg"2⤵PID:2664
-
-
C:\Users\Admin\Desktop\taskse.exePID:5564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 2963⤵
- Program crash
PID:6060
-
-
-
C:\Users\Admin\Desktop\@[email protected]PID:5660
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 2403⤵
- Program crash
PID:5016
-
-
-
C:\Users\Admin\Desktop\taskse.exePID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 2963⤵
- Program crash
PID:4248
-
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 2483⤵
- Program crash
PID:3168
-
-
-
C:\Users\Admin\Desktop\taskse.exePID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 2963⤵
- Program crash
PID:4180
-
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵PID:5720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5720 -s 2363⤵
- Program crash
PID:4968
-
-
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵PID:2152
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2948
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
PID:6108
-
-
C:\Windows\system32\NOTEPAD.EXEPID:2224
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4920
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5544
-
C:\Users\Admin\Desktop\@[email protected]"C:\Users\Admin\Desktop\@[email protected]"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5212
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\270e6513d51e474a9e366c8ce8b169c6 /t 5800 /p 48681⤵PID:5784
-
C:\Users\Admin\Desktop\@[email protected]"C:\Users\Admin\Desktop\@[email protected]"1⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:1112
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
PID:5204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 3042⤵
- Program crash
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5204 -ip 52041⤵PID:1908
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2522⤵
- Program crash
PID:5812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2636 -ip 26361⤵PID:3112
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
PID:6056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6056 -s 2522⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 6056 -ip 60561⤵PID:4716
-
C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4bnxbpxt\4bnxbpxt.cmdline"2⤵PID:5928
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC4D2.tmp" "c:\Users\Admin\AppData\Local\Temp\4bnxbpxt\CSC85BA2F1AAED844C1B15DD99C7641FCBC.TMP"3⤵PID:6108
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:5224
-
-
C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yda5qzit\yda5qzit.cmdline"2⤵PID:3572
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC4B3.tmp" "c:\Users\Admin\AppData\Local\Temp\yda5qzit\CSCC81DA7B6B7864D7F94A9B495415B9DF.TMP"3⤵PID:6024
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5624 -ip 56241⤵PID:3544
-
C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"C:\Users\Admin\Desktop\Ransomware.Unnamed_0.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0pyyumj5\0pyyumj5.cmdline"2⤵PID:4940
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE58.tmp" "c:\Users\Admin\AppData\Local\Temp\0pyyumj5\CSCFC8DDA1864D8489CBAAE2E20B45F47A0.TMP"3⤵PID:3252
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4732 -ip 47321⤵PID:6100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:11⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6380 /prefetch:81⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5720
-
C:\Users\Admin\Downloads\CrimsonRAT (1).exe"C:\Users\Admin\Downloads\CrimsonRAT (1).exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2008 -
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"2⤵
- Executes dropped EXE
PID:1828
-
-
C:\Users\Admin\Downloads\CrimsonRAT (1).exe"C:\Users\Admin\Downloads\CrimsonRAT (1).exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2732 -
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"2⤵
- Executes dropped EXE
PID:5752
-
-
C:\Users\Admin\Downloads\CrimsonRAT (1).exe"C:\Users\Admin\Downloads\CrimsonRAT (1).exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5224 -
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"2⤵
- Executes dropped EXE
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2816 -ip 28161⤵PID:5660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3136 -ip 31361⤵PID:5084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:11⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:81⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1880 -ip 18801⤵PID:888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5316 -ip 53161⤵PID:5364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 636 -ip 6361⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3948 -ip 39481⤵PID:3136
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1496 -ip 14961⤵PID:4812
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\977debaaec74436a9ee297c3c2148827 /t 980 /p 46161⤵PID:5892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4632 -ip 46321⤵PID:5800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5564 -ip 55641⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3972 -ip 39721⤵PID:3584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=85 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6884 /prefetch:11⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1576 -ip 15761⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5024 -ip 50241⤵PID:3932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:11⤵
- Checks computer location settings
- Loads dropped DLL
PID:1240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=86 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:11⤵
- Checks computer location settings
- Loads dropped DLL
PID:440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7900 /prefetch:11⤵
- Checks computer location settings
- Loads dropped DLL
PID:6084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=89 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:11⤵
- Checks computer location settings
- Loads dropped DLL
PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4024 -ip 40241⤵PID:6096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 5720 -ip 57201⤵PID:6140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:11⤵
- Checks computer location settings
- Loads dropped DLL
PID:5312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17935673318771047476,6382517667815550577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7324 /prefetch:11⤵
- Checks computer location settings
- Loads dropped DLL
PID:5664
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
3Pre-OS Boot
1Bootkit
1Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
6.1MB
MD55c04248f3b1e6a072b2cd9615d007bcb
SHA18ef5eb5b12504f5c412420c5bf618896e4d3da54
SHA256aefc731ebe32e902c6be703e9db02246312c5add7a808665f62fcd91539e23e5
SHA512569825687eead866e31018350a71d2399bfe23d3024285041e7b93b2aba8b8e3a97d283fe68236d14e55b39b5c6f9ec9a2f5b1098943d9684cb36c6f53524782
-
Filesize
56KB
MD5b635f6f767e485c7e17833411d567712
SHA15a9cbdca7794aae308c44edfa7a1ff5b155e4aa8
SHA2566838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e
SHA512551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af
-
Filesize
2KB
MD56d1fdaa0eab80613585a67eddff3c32d
SHA1f270d9d29c067a7b03d381e52c922ad20a594de5
SHA2568e4e4153f0340300a69b3f25bfbc9ac720e7595783d683ccfbf7982267e0af1e
SHA51297ac919b5203bc5d26b57be5173cc22f98e6a19eca7822d7e99eed7011d653bbbce64bf4d5e3c35cfc7ed8214d4efe54923819ff41fda95aaa40d485068c54d7
-
Filesize
152B
MD558670ac03d80eb4bd1cec7ac5672d2e8
SHA1276295d2f9e58fb0b8ef03bd9567227fb94e03f7
SHA25676e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8
SHA51299fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff
-
Filesize
152B
MD50d555f014bb8e786a806bc07484ef719
SHA10210db8b3cae5fa112103a12cddbcfd13f396c1c
SHA25658a4da67ddcdb2a8df0a5956e1c8c5bf52baf2a883f7271255d23dfed83caf9c
SHA5122b0251c8f6060097c317954eea00c3a8a92d70065c60baf77ef07e20c87899b598eb894e2efaf8fc0de9e162b56916ccae542ee2d427ad6b901453981ebad33b
-
Filesize
152B
MD54d9626d24dc5cb7e3752366fd379d42e
SHA15cbccb404caf1daff0dd3b02d6dfffef3b55fc1e
SHA256550129c1788c9d1db6e8cf870164d7c7fd7777e9ae21ae12ed99eeaf1bb0baa6
SHA51289f799e2fd48660ddf38c943149ec20ebf41206e4f1121f24f852fe7d44230c961170a14e1c90500f0e9842cf668d5616ae5505280d4856e1196a53ed97dd68c
-
Filesize
30KB
MD5e2bcdc53d14e50b8f40ece616c16731b
SHA1178ce09ecf9a1afe10049d794aa2594f5ff57e0e
SHA256b986c5addc350cb3047fb0bcdecc1e0e37457c524bc1d05d93a5b5bfa8b7b685
SHA5129ead10afb785eb54c27271e2ce359d6c0efd7bc4e3d4646a5dea03463b093daf5e7fa7432cb93148c66f0c9db82d8a4d45596834a72de9973ffd2d13063d9c96
-
Filesize
67KB
MD588a552e6be1ac3978c49143983276b3a
SHA1dbf4f4dc62a3da564b1a87b5191dc9a72a9b9423
SHA256927121d8118a41fa3460b9ad84daeae59ea60dc9607e462b7e1341bea60da8d5
SHA512125b13be3d209ff5cc12d8f9f12d01d271cd50c2800059241ebb419167c21adfa9d979ff6b8d88052f5d302e98090b7c8ceff4894b397168d8ba6d8a6204fb9a
-
Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
63KB
MD5710d7637cc7e21b62fd3efe6aba1fd27
SHA18645d6b137064c7b38e10c736724e17787db6cf3
SHA256c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b
SHA51219aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
37KB
MD517da64fa4c58f181ade8ed83a36b9311
SHA1f6b6b6e543ce831ed6534ff725956841dd5c8d69
SHA25696f35b994015bb949352ffd8ba75a0d555a9a7fb3d70afd09f93796218a924e1
SHA5123cf2a86c54c15577d7258d9ae44d72b724c7b3eb600fd9bdbc21bcdaef5dfe0910999ad16e1bd4301e26eec72858b53b68373928baf891e48d1f9297a2b9c67b
-
Filesize
1.1MB
MD5eeb2da3dfe4dbfa17c25b4eb9319f982
SHA130a738a3f477b3655645873a98838424fabc8e21
SHA256fbfee0384218b2d1ec02a67a3406c0f02194d5ce42471945fbaed8d03eaf13f3
SHA512d014c72b432231b5253947d78b280c50eac93ab89a616db2e25ead807cab79d4cb88ffe49a2337efb9624f98e0d63b4834ab96f0d940654fc000868a845084fe
-
Filesize
33KB
MD53cd0f2f60ab620c7be0c2c3dbf2cda97
SHA147fad82bfa9a32d578c0c84aed2840c55bd27bfb
SHA25629a3b99e23b07099e1d2a3c0b4cff458a2eba2519f4654c26cf22d03f149e36b
SHA512ef6e3bbd7e03be8e514936bcb0b5a59b4cf4e677ad24d6d2dfca8c1ec95f134ae37f2042d8bf9a0e343b68bff98a0fd748503f35d5e9d42cdaa1dc283dec89fb
-
Filesize
74KB
MD5bc9faa8bb6aae687766b2db2e055a494
SHA134b2395d1b6908afcd60f92cdd8e7153939191e4
SHA2564a725d21a3c98f0b9c5763b0a0796818d341579817af762448e1be522bc574ed
SHA512621386935230595c3a00b9c53ea25daa78c2823d32085e22363dc438150f1cb6b3d50be5c58665886fac2286ae63bf1f62c8803cb38a0cac201c82ee2db975c4
-
Filesize
105KB
MD524cab279a1b1479cd2848b4cf4db97d8
SHA1c59c889167dfa25ea85e0ab5b93db29270cd9a3a
SHA2562feef54f715ea3e6192ec7a9d30e910044968a41d8fe91fc9b1b469ad574df51
SHA512d1ec7ed765e5ec1b5e095a917437ddcd783ad01a1d6025f1125906617afc24e1d3a9cd702616d18c4231e5ffe60e5326a8dee855db42bc417568283c310e5c10
-
Filesize
155KB
MD565b00bec774c969842aceb3199fbe254
SHA1bd464411b9578497f081a5f8b6c04180b6ee0f0a
SHA256d604e67e9d16b6b3d2f10687a36ec00597c48288fa60bfa957bd3ca78eadceda
SHA5120c89ad2ca25ecd9058e42ed477bf6cd1512859c7ac63701206a82f2591b2878acc7f9354b6a23245fd186ca9b3c809cf7700c0e3e43f469c37580d8531d3beac
-
Filesize
109KB
MD5bb3fc9718561b34e8ab4e7b60bf19da6
SHA161c958bedf93d543622351633d91ad9dda838723
SHA256d6ea500b6752094a4c340d4f5ed01afdca1925006077560d9a3f56054cd8d141
SHA51297da30e9a0d14e6f9151539b77b2216e0f6b6cc4742f075077f9ff92f46f8b97e82f020c562625261eaa01bcf810ce81c0b7b71340ac566aef1bef5a07dac63e
-
Filesize
53KB
MD568f0a51fa86985999964ee43de12cdd5
SHA1bbfc7666be00c560b7394fa0b82b864237a99d8c
SHA256f230c691e1525fac0191e2f4a1db36046306eb7d19808b7bf8227b7ed75e5a0f
SHA5123049b9bd4160bfa702f2e2b6c1714c960d2c422e3481d3b6dd7006e65aa5075eed1dc9b8a2337e0501e9a7780a38718d298b2415cf30ec9e115a9360df5fa2a7
-
Filesize
40KB
MD53051c1e179d84292d3f84a1a0a112c80
SHA1c11a63236373abfe574f2935a0e7024688b71ccb
SHA256992cbdc768319cbd64c1ec740134deccbb990d29d7dccd5ecd5c49672fa98ea3
SHA512df64e0f8c59b50bcffb523b6eab8fabf5f0c5c3d1abbfc6aa4831b4f6ce008320c66121dcedd124533867a9d5de83c424c5e9390bf0a95c8e641af6de74dabff
-
Filesize
24KB
MD51deeafca9849f28c153a97f5070355d6
SHA103b46b765150a2f308353bcb9838cbdd4e28f893
SHA256b1639f4ce0285c41f4bd666f3fae4767094e3042b0379646b5ccfe04ef01ec19
SHA51252122b7e3ca9b58eab42fc652c24b4b8c17c43970f88860372d8377c49c540c31ddc81b519f4d59d34e199571758f82ab2fea0737ac1f847b3d4dd75d7acac19
-
Filesize
49KB
MD54b4947c20d0989be322a003596b94bdc
SHA1f24db7a83eb52ecbd99c35c2af513e85a5a06dda
SHA25696f697d16fbe496e4575cd5f655c0edb07b3f737c2f03de8c9dda54e635b3180
SHA5122a3443e18051b7c830517143482bf6bffd54725935e37ee58d6464fac52d3ce29c6a85fc842b306feaa49e424ba6086942fc3f0fea8bb28e7495070a38ce2e59
-
Filesize
43KB
MD58d1ef1b5e990728dc58e4540990abb3c
SHA179528be717f3be27ac2ff928512f21044273de31
SHA2563bdb20d0034f62ebaa1b4f32de53ea7b5fd1a631923439ab0a24a31bccde86d9
SHA512cd425e0469fdba5e508d08100c2e533ef095eeacf068f16b508b3467684a784755b1944b55eb054bbd21201ba4ce6247f459cc414029c7b0eb44bdb58c33ff14
-
Filesize
28KB
MD5bcf8a9566c19c82f4bdb43f53a912bab
SHA1aedbcfb45eed11b7ad362b53ff32bacec9f932ee
SHA25652c97dd2602b4d9ac70b61c3dd9b0f9869c5c211e2a4b52e94eda5e150349ae7
SHA512cfec8603b3eecc261735ddb3d9f292f47e5e34761d73c33b8a1fa1efcf8e07b9b5595a28eac3b238842cf1f63a155b0376840f42ab22ad3186390bcfbc62adfb
-
Filesize
20KB
MD58b2813296f6e3577e9ac2eb518ac437e
SHA16c8066353b4d463018aa1e4e9bb9bf2e9a7d9a86
SHA256befb3b0471067ac66b93fcdba75c11d743f70a02bb9f5eef7501fa874686319d
SHA512a1ed4d23dfbe981bf749c2008ab55a3d76e8f41801a09475e7e0109600f288aa20036273940e8ba70a172dec57eec56fe7c567cb941ba71edae080f2fdcc1e0c
-
Filesize
18KB
MD5d07f175cbd2c52604838bcbd34bf7386
SHA11e32ac6ef3b42b664a681867b8243ac04a1d07fa
SHA2560e733fc8c782ac8a05936c392d72e3079f49dc348019a84103184efd011d8f45
SHA5128ccd985d4100190e76e1443a1bb4a5b1783d1318200ad51a0ed7ef675ba0e8a4e7f6ba16268240ab86d6e38b9d8b26136ab297672889f6a415fbf11132819973
-
Filesize
19KB
MD5382e5a265d13d3280b41f54973289ab3
SHA1e36e2cadb13183bc03fa209b8bceae3384dbb0c4
SHA256827c580a692dc92d7ae2d2d6acb946352dc61cf7676e27b796548cf793161463
SHA5121b7b50d939d9db580800fe556149107fb4e062d28fdad79b8481af8e713731a1671e6a8a52f966bab82fc13b7a41fdaa225e133e66aef616048b39beccdad251
-
Filesize
59KB
MD5063fe934b18300c766e7279114db4b67
SHA1d7e71855cf6e8d1e7fbaa763223857f50cd1d4bd
SHA2568745914e0214bcd9d2e6a841f0679a81084ef3fc3d99125876bee26653f4253e
SHA5129d0dfc21306b3a56c2ecdf1265392271969e3765e161e117c8765125b34793e24458217cf6514b364f351f47e65baaaf5856be0d13406a789f844d6ba8c7075f
-
Filesize
63KB
MD5668b709219a3bc003ac35038ad55daa8
SHA165d4bd0e7a79f6717d00656d3774c9cddce8c536
SHA256075482464634359e34d7d49320b08882ce1f8c742904910caddcae0db6d86989
SHA5126bf60d57cd41c555f4f2a205994690882d44da5617de36a144219983f71f6e06112d15816b138cbd7bd37b29b9802f009c3503204c7e2b8b0354b3b3ac16b941
-
Filesize
153KB
MD52f3c7b5f9221520efbdb40dc21658819
SHA1df12f010d51fe1214d9aca86b0b95fa5832af5fd
SHA2563ba36c441b5843537507d844eca311044121e3bb7a5a60492a71828c183b9e99
SHA512d9ed3dccd44e05a7fde2b48c8428057345022a3bcea32b5bdd42b1595e7d6d55f2018a2d444e82380b887726377ab68fa119027c24ac1dadc50d7918cc123d7b
-
Filesize
23KB
MD5bc4836b104a72b46dcfc30b7164850f8
SHA1390981a02ebaac911f5119d0fbca40838387b005
SHA2560e0b0894faf2fc17d516cb2de5955e1f3ae4d5a8f149a5ab43c4e4c367a85929
SHA512e96421dd2903edea7745971364f8913c2d6754138f516e97c758556a2c6a276ba198cdfa86eb26fe24a39259faff073d47ef995a82667fa7dee7b84f1c76c2b2
-
Filesize
36KB
MD501369d5062d49b270c8dd6ab535bc403
SHA139c654df64cd7386081da8108f23573f331debab
SHA256ed672ed37bfdadddb835de8c346655a17b653094197a2d6080e6777fa59785ea
SHA512de704934135717cb62e4d15ef1666e78b3d43c17ff5d50b279c21a5318ac2ce0cea88ebeb17b66f4668e1ca1a8801bdd6bab0194b157b1da6bd90c71b29da08e
-
Filesize
27KB
MD58f388e8f26b9883f0553dc04de05b0ac
SHA1e5be74eb878a6048058ed7f202cfc3b1fd31b85b
SHA256acd50cbbfd8f330b7ba3845fbebe6583ba3ce08e8516ac8c69c7795327230f1d
SHA5127290f00bc74e35e3d367d9b187dfd38e6cc578cf334f61dd286e43eca3e344562d024ee9700916abf20f80a0ad80e4c075d91936379b1677e68d4b4272d93f01
-
Filesize
77KB
MD53a3dc85ea79c241ff89f0b498140ae78
SHA1b9cc8d8215568ccfdf38155f700b230f74c8c40e
SHA256c594ea36aae724386a3a8f93f0cd8c08cbb9e79e8dcdad298ed63b83018fd6d6
SHA512921c00dd16f9e1c1889788c908d6ea05fc2d731feba66dab44504c243055fd69340e3fc3abfcb7a47858761a1a708b3844f48d3fda38224d3d552c3028bffa1f
-
Filesize
1KB
MD57836bb99944f630bd23ab0120af532e1
SHA1cce2f4287655bbc6309ccbc9ea482d822347fff7
SHA256b9f78b7f679c0c1f6ae679ed5e5d3a02ce33f883dbb681bb5d43c2b1cbb5496d
SHA512cf9038d5648b13368a147b08f31b2fceaa81e406fd18721d5f3c5cc6dfc1b3fa759b42126aaf423b69cd57539191f2f717fd79d5edba577a5f7a842e145e5989
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5819e633581c4f0e1dc5ee7c5e1e901ef
SHA137f5354f09f183abd0e30213818d634de311a4dc
SHA2567f3bf8f728fc25adf2d92c7fa759f6789b2ea6ecdf7b2789ca9da4c454a523a7
SHA51232d79f5ecd0521a835972f78fa24c60280b15fc5acefbd71f6cb7df8b0bb0c3bf0807cf23ded3dcdb1b85e07c16e3970c29b4102b40bb57f4d0e14d9f9ed6bc4
-
Filesize
950B
MD56b803ecd92d6380e652bd0428b54a5fa
SHA1fa7b42479cf1613a5894a2920d21cd14d75941fe
SHA2569859a828e3462ceb0da7fbae5517802eac33560edc7686e75fa2f614f1910262
SHA512e62d8e507bcc1c7cf98678ddb288db865a7066c6c4be575b8c86a1c8d79c2454204805e607b189aed866eb186c543168a6d4f3c0c72163c48cbb51388eaf0c7a
-
Filesize
1KB
MD56b29d2fa532cf455036ebd81cb7a36e8
SHA18e3509e219fa253c47b0caa64e0f50ca4bca7ed4
SHA2568ce8805bb0d0779dd942988801ea9af7191f7cddc4e9c01fb40a2e455fd24013
SHA512a4432b5ca046d4afe649e67eb135c9eaf1b1645d40fef2722d6524b10269d1ddac472d04f467b676558701d8107121a1fdcab6e6355a3a9d053ea9c5f47a49e9
-
Filesize
1KB
MD54183d59e953c6b39cf707b810e06bd75
SHA123b77ec5357281b03206385785c626b6c5130a23
SHA2560370465b69d5ff65e7daa2fe1c8b11b1d93608a93e576da5fcf9808e64b65c73
SHA5126e6c908128adb0c706f3bad8eb0b7f7a783f36298856d7d3f80891f522d63fd1f90284d74fba20b2b3679a872b6e15ebfd4101a4da9b03a03697564b92fe3b0f
-
Filesize
1KB
MD56841f0ab7f6b3aad244213ff5f4e33ea
SHA1e109a6a5e382a3ffbe0beaff6cbb09f20f2e3f25
SHA2561644a40f1f8058d4e042d61db640f56cd2be0eecdeaaa744187ed9262bfeca51
SHA512bf7129727940d945d82a9c9c1507b462e9a791818505e042db562ad472de848764816310fa800253fc0b792e8d2b21aba91baa0dc07ceec7278622da36b1c9b0
-
Filesize
1KB
MD55f2b2da1c651846c2bc0e756f4722f6e
SHA1644d967886d678a008d2cdbfbce43ba9fdb509f2
SHA2562a51568be96d49c580517f8389efc53a00cd2044d33beef866e3567f5bd9effb
SHA512d009c2bcb075f86748096b489b4fa691835c1dbc184f584e07baa2e64f0b611791d7435d6073e29b3a1ca359830ccaa14942604a74f0c7b5972f7089eaab1cb3
-
Filesize
1KB
MD5dbccbbcff54cdee1207e0da3d6ffc491
SHA1e8178e2f92d5a9cdaca00718817f1cef911b1f7d
SHA256dd78e454a8e6af6b2281bcf81bc8e1d2bc5b2558e49ab59a4e4fde1bf290d519
SHA512c0e213b514dd3c501557d78e7d2569a0f497ee0243ea238c47f7c086989672b29ec46e03a9e230ce81fe62394306b9102df4309009c64d699f442c92f4a94e05
-
Filesize
1KB
MD54d905d0793d6d1f57ccae28b0401c584
SHA1be172554abed25930645fd025d7b70faa8d2f014
SHA256a15fe46a3025b3153882c34beffb1e4559e02a2eb31cbf08b42132aa52b2b9f6
SHA512c1717dd332a10e813d7f678d66331cb0cf47b3072b57c2449091d130885d8615c58ead25653733644b692ac3b75c5ecdb3ddd194992c16e8bae357083020dd8f
-
Filesize
1KB
MD5d316d5deb8b68cdc1f45818461719fcc
SHA1ae6fc41b20560597c76cda5799c7f9000b3aff3a
SHA2567c0d13585308f67286262ee118f28edfdd6e0b4d94db5275286e35e2be8364c7
SHA512889c4176278e2432414fe3a03b4683df85e4f61054c3c85845623d06edcd8d49f68f0eaedf975677735de536513ba42b276de6d141ec3dc7e3b5352e360977c0
-
Filesize
1KB
MD53e91e5077f12c614aeb9f20ecb176f1f
SHA1e54f48a8f58249d2f3d0e5d0183932fa21b02a60
SHA256fab1630a606958063d432621ce9febd93cbdfcbefd40dad62c145f0b3f82ddda
SHA512f2a7cefc6cd8cf9f92e3fd5b607adec2a76532cb16463b51aeaecb0f93a1051bd0c71f0e3337b5c108eb17ba1baa3e4fb8690c726dce5ff949773fa252527a9e
-
Filesize
1KB
MD559419b1e9637ba1997c9a9ad0bda6446
SHA185779ed26cdc0dbe79aa54dece7422eb3f8324c9
SHA256d318be624de3f0e28e8b4fd68af25b1da6b34b53d298251ba68d070f4e17afc2
SHA512633a1b5e58358471a8daaca601b8ea51b0cdb7a9dfc66a6fee14f5be164e9082e8b4a97ffde21a9b43c19a835f27e69e4a98c354740375110370c1ce7e1e47c1
-
Filesize
1KB
MD589d0127e9955aad800d24cb7a14d2ad2
SHA152dc877d31d2c9f014a3c7682a13b83785501ae0
SHA2565143246e0602ba22669fa4f4ee089aa19fd0f98a913e911d098bfd2d09717b29
SHA5124a89687f1bc4fefccc01d34ac18f99e0216f67f41a4c6cbd75684abf7841a8df1608ca44760bdfc9c96ea78ec94ae141e20b41226fd627389a48c025f32bea2e
-
Filesize
1KB
MD55e49076768e90aea8abdb3b7d0be95fe
SHA180b26ffd8f5158d7b136bdda4febfcf4bcdbb864
SHA25687229a063e66494fc0e36380fbb67d669a90bdb43aec1bc6d1703d571b68d32d
SHA512053b47bdaed6ccb716e747756f001025a9ded9ef759a154cae40318b8305d419fc11a5a34519211eb6d0ed09bed53e8eb0d75a51c68cbff6a36e4f89c2e3dc90
-
Filesize
1KB
MD5eec5cf80433fdac201691c495de62af3
SHA1cbf2bd15c570be160323914df51caf223950bd81
SHA256a51a06b2bdfa8a09207574f85016a147afaf75a844fc0b5b0d89896685442f2e
SHA5122506215dbdb0c8deaf4daad13fbf5938ac724c2c1569076d267aa6538392f6df28b9d05632b123f8c43c54fc47242285ac99c53d6f2a6081acaea9b8c0238b55
-
Filesize
1KB
MD565852c95fac2ac59423d6919f6b9997b
SHA1f12ef558c9d553451d865f72877af3bf78e7f157
SHA256ca5a7df1e3433fe2903b64203efc97d6dcbde315ae937214b5dbe212e3b12f1d
SHA51201dd3323bfd2cea29ac718e8d2039e3db1760b90c4e67ac178d509e1a8f3d9266bd77ec43ab41165eae066ef2eced4bd3f451594e589e0b9e3cc6b980b412418
-
Filesize
1KB
MD5e5403c9936dbcb4927bbcfb208833a9e
SHA16d6bf23d1ba2ea9f20a0d16d0173c83bc2eb5e02
SHA256adbe5050f5906bd2148303385178c0ac8ac5271d5c05f5dccca3e285809753b8
SHA512f21dfc41dc5031b89887180c3060b45afc2c12afbac122b1cedc60227af2f99116be885c12dbcef9b6e5832d676130c1d86d34d07b67bc1838492c3def0e4a66
-
Filesize
1KB
MD5a37fd8907b50a27619485fc6b84b4e2a
SHA15d834e36f228629ad44c742c712abb841ebe160e
SHA256eacbd44c878722c91f5e4aa17a9bc3632e164ec1c88a910188de25f4a0317714
SHA5127bdfac27cc36fd4cc48ee0c179eb58819fffc91033d330f3d2c4af71ad7ef57a450c6778763a590acbca468f24c4436997ef41f0fc6e1b376361733dee79c416
-
Filesize
1KB
MD5d9f7e9a444384710d80e1d7015b8ccf0
SHA1f1cbb01f78992a5d428b625d80a6f1c6b541e9ce
SHA256a2ed9f4f3bd7d0cd934d01344ee564983215d14ff47a7cd14021f8b4ccd51ec6
SHA51239bb8e3c536894aed79b3f694a5e8339abdd2ef74e64032a6e7bc98156a907a21359afcddc231c699ae768a7c6f45f29d5bed1fb632580937f8daa73657866ad
-
Filesize
1KB
MD53aa91937839aa2b2d756200599961497
SHA1a2fb70d5460efba0081831703507cb52f4752776
SHA2564034b6cfc474c602bf8bf8c9581cf73a3bd80c3aebfad7401c0919f8534c4c7f
SHA5125653c1b2eeaef3d9e5056dab4f29bb522ca866ee81965afaeaee08d1d9571b3f7e276b603c1e195d6da5bc4679ee7073ca8ae726d9b9da1c3db03b9eb404b967
-
Filesize
1KB
MD50d6e3853dedf4ed2df5786a0887b1772
SHA14426bb1f9ef28f3ddb8e6f007fcd1b0ce4407cbd
SHA2567dde0b88e88d665c6df6e398b265037f8d8ab7e76dd977893b3c04bfcc5acc4a
SHA5121a761194fba2a9f64e7022b66de72db1b782b25084b0f588f736834b89e12c826306aabca340252576ebeccb7ad3b33b8c22783a8b69c2c25cddbefe12aae8fe
-
Filesize
1KB
MD5f28fe9dd559e0ef3ed16e4003379cd68
SHA17c6de9e095b9e2fbca8f34d8549a2758a6642274
SHA2560b11136622925ce96d7e0383361f4b2cd2f5d8e0787645ac6715aa0628e85947
SHA512a628416a8a17342c5e556537b4ecd07585502e155c4baceb5832521056f0201de21042f39305f214f4a7fb162acecfc8a104debef358912f7ba0addec77898c5
-
Filesize
1KB
MD55894c442c3700ec051bfab41a40ad2bd
SHA1c8391f8bd880d664bb1bae6a5e7e64d786db6050
SHA25644f420695acaf0d0e712480ac709ad038c0b069e8d5cdf5bf9d4e27f328eb756
SHA51201243022d13a055e4ce27e0d0233981282448701245672da6d8bc037a77004fa30627adfef8c7127d6352a7ec62753c790e9027e015a6cbb16f15181a3bc6d68
-
Filesize
1KB
MD5020120adce3db7641cfd440ec2eb7db5
SHA1dda26f5c0182847669ff580624284a7d262bf4da
SHA2560eaefe677832d9761279d01d1e2a5c14185347da94db6db367e005b4a4996879
SHA512d70e77f4ad11cca8c8c186f7a5d77c5db11fc8357c3d5f69539bbf6604c8322716904bb25473f32f7256c1e7d00c08b229c645e02df4fc89671312619b5e7227
-
Filesize
1KB
MD57eba6de311336d71c0a7df90ca80210b
SHA1aa5c202554d88ff5a0a84a837bf25a9f478018b1
SHA256c3730b387c6af21d17b6f9fdceb358343306d83c819e30dba47bd82bc2e62e97
SHA5120510a857501b2688fee4dc0d8c54ccd25b9493d5e226c4705883813a841b3d25bd4aab054760358f2805a42d3ec72d62b7a06dbe472b0d0e2d7bd53f71fc00ba
-
Filesize
1KB
MD5405603a24709bfc8a0c3a0d885eade1b
SHA1e71545224d6c6a92485af02caa1324333e0ea0b7
SHA2566f653f4acb20a1c9117be002dec72ab5e16a0186ebd20cc209c518736ca92623
SHA512e53fb8e374baa7b4db929c2eb238f0a4050e6e65e0e5f3afcd29175922a7c1b360e87ea37acb1013b7ea466cefcf4fd3721f417208e0c8cc68c88145facd13cc
-
Filesize
1KB
MD5ad9f38efac7494511d67e37aaadaa7b8
SHA1f6521294341a52316b9ce7077e0ba0c701747f5f
SHA2561ef3096f5f88ee76614a6804b0f1cacc529fd4343e625d1831fa96db7f0a369e
SHA5121950d51f9fba8169a6a4849517a153db511de80db02188d53fb895cfbbe8cd2ee0187a887f3f1bafc99ff7d32f7e3f3d3d51a0f7fef510d5edf5d3a54865678a
-
Filesize
1KB
MD586e022360e9c59e40b23a1d231af2210
SHA1683288ce5cc509b610c76d44917e78666804adcb
SHA256ec742a4d051f885fdd7e03c5e0d1075101d0e3d35688afb1f6903fd5e8355d4e
SHA51212f117ae7d4ea9c13f08a2ae525ea2c8eb849e051a73150e83c3ec96e1929e3679f1caaa3460ba25ffa6b64d8fd6dde8f5b72e29ddb83472d4cc071a9bc34675
-
Filesize
1KB
MD5704f09abab43b387d8eea0e82ab77f0f
SHA1e356cb5ad1c82032f1078ff97feadfc5ee9fa056
SHA256733e049eb55a4af88c6a31a204d603373512e9ae8961f8b259a4a5aec7664292
SHA512acce40d6006746ff82f5267b4f4fc306faa115d6c3ffeb6a11cdae342e461dc1da5e7f8ead7393261fd70ca463805c28483fc97f09cc3b156625f39d812ba5f0
-
Filesize
1KB
MD5e0b379956196a7d134b04d4f41a5adbf
SHA12003d7e68879c4619106d73b3881319bdb7d6bcc
SHA25617848cb137b3e163dec210a6fcfb06fa151bf10fec030233559b18d7a2878af1
SHA5120710cc01b3e13e61178eb1529615e7c1fbb3cac1d3059d21229737718277e5675986c691bdf26477a67589df9dd7135838c6aaac707d2dc2150dc323302fd132
-
Filesize
1KB
MD5ea4020f4938bac343b0f2e1aa1c380b1
SHA16852105ce4cd688861be3d4b20e7ecd1a013c048
SHA256d3b124036f512c601729b5c54bd38144add5fc709a83460f4bac79cb2e2ecbf6
SHA512d1972d6487efbb3960836bfc5fb43708a50e19ce929a2b87cc81ab8e561d21b2bea91209951297be16fd91f709c484d5afa98b86108487a1bd08e577036a4085
-
Filesize
1KB
MD586e8f9a36f0c58ad06ec856904e741a6
SHA1407bdfa1617fb5638e01f65051172123b85aafbe
SHA2563a09e606520d1aa30e158b3e47b9ec14e783a40b6415a82f573137dfc9654c64
SHA512fd6471faebd9db09d8a89cd985240c00f4d27eed2a26dd43cc25c57157f4f1faf2c1365b09fcc065e3db7a8dca2093552809e2bee7ca8abe8493b823ae13df0b
-
Filesize
1KB
MD558d583d835e5587ab9dd772eeb4bbc47
SHA1debdfc918469febe474a70d3fce8a1d462164424
SHA2560c1dfa9e48c22660ee2303e3f91c3f5c2523dc76019d74c79d55fce013c3f76d
SHA51216f7f3a66d2fc979d9610d78d6b4b4c538cfb4fce0e93eb21b4c2380ac853a09f7a8fd91c6a8173d85bdb6f5fc4f45f0e1513acbbabca02add6e849a4852d4a0
-
Filesize
538B
MD54ee7182557652171e0c25937c99aae93
SHA19b2905679d03db887c1e6524fdfc0db14df4d29c
SHA256d6c2b189d5c32c70e8fc7d9b6eb665f3f04db0b573ee8b3d660bcbfc98cad8af
SHA512e491fc750b66e5d320cc0f64d9ac8d8fbfa9ea5d797f16e99d67f008d33cf0f14f8cb00c22b62c1a686c3ca1b724d5bc8088616697205cf7b12d2ed42acf7e54
-
Filesize
12KB
MD57e270121427b98b75c25577348e14b18
SHA1fe4a87c9b3fe2b6854d5d104f99041e7f3e55744
SHA25666bb10aeca072ac18fd4c2aebc15cbd2871b7b32841f21e93dcf796f1df3009b
SHA5123963971a652b944d7bb4ae4537ecb2ad09f2e0279355ac221ae35eb07126f776c98d6fd900e2c11f57e475765690d25302003bfc50dcb578e6cbb0a59b6a4316
-
Filesize
12KB
MD5931ce22c0cc91c531651ebc8ca9f98a1
SHA1880593a910fe66e375c5d4a9137033215152c924
SHA2565664efd594703d170524a600071bf0210d83ab601121f267d7db76a9b5828aca
SHA512d98db4ba66a82d8e9936cf674a15d563d962917f03a5d7c7554b4d795b989556d308402770769e2702b2e96a0c5676d6ced605f1b858e9321777bd3d64b17744
-
Filesize
640KB
MD5ce30dc550b8088e8702ddc123ddeb5a5
SHA1e98df0ffddfcbf8420d983d45f7bdafde82307d4
SHA256f9f7d3e7e3059b5b9704886fd9ac6515c851c571a99232c6f234f1573a25a397
SHA512f48bc801b0e5ec4ab3761af7f221d11f219aa567fa8124db60f6f1edf5e6e2808c788fa0406c53d4308bc8227fb4d089bcc8ebae0296414e5ae4367a7ccd741e
-
Filesize
1024KB
MD5cdf6b5c99e1ff6c560b4f38bfbcf0a8a
SHA1f986f330dfe9559e384a814acc9283410a968a8f
SHA25632156e353462ba7d7350fd86dab842e38b1b7db24fcac00063f7ae62474b4635
SHA512071438bea4cb6ce6f7cba0558d9b4b2d8a4f45bf4f403da97b7ef23aadb1ac4aef6dd548997fdfcdbfa515f12664e704a0ff6eb5902078baf56c18097d8ab188
-
Filesize
75KB
MD5aaf8e489ad03d3752c09f1e19883324f
SHA1683956d31fbe0a89337a3763912a626996cf1f34
SHA2569a49b90fa8ee6b93f3ad2d607d8d0c133efb1639304c2ab8ae7974a61bb2106a
SHA512a4e6b06e8cfbd34016994f8d9be0153cfbf71de3fa1de92b4d94bc74b826dbfe2b25e7e2496b24e3f2379b5cb4b6d676544005327b938dfcda83766fc929319b
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
29KB
MD5be0c48fc5057a467514eec58f1b1264b
SHA16d656174c6c9ab1e4c3d75cc9270a2aa4079183b
SHA2568685fc1ef0ff239f59289b26d9aa7134998f4cc4a15b22c9a8922c071bb32639
SHA512157df2d4ef94906418ea32be5feedc28aac61787033e7473f0eab8e22d32a2a83ddbb5c43c16b0d5f83c8c27f167e1fcf2967df35bdbafca75327dc35ed443f1
-
C:\Users\Admin\AppData\Roaming\@[email protected]
Filesize583B
MD5111f8de2aee2b54f8d122124888e6b39
SHA1eab7314b7ece9315a4d8193be1e3602cc8a395cc
SHA2569db9deecd952ce1005b34e33e38f948bfbd330dc9a923ff70637e20eaba4798c
SHA51224764256024fb3a34270ec2b8449cb1bb8aead270eb533cc624ea6ec18efa4a275593ee8ebc51e9a86612de2380f88960980483f9e62e8a5193fd0e49a8464e6
-
Filesize
1KB
MD53e8696240970031dc24af8f7706ef4b2
SHA1a683e85eca8c1445f0bd4eb39c26b9a6fa035609
SHA2563552f0b89c8851c2387f5a879394ec74b376a89457e369152eb4a918b3551ddd
SHA5122a3cb1ad7c9713c7889205f3a483687b1deceefc609ca505c4142a524b16aa6c7775c4745f82ebdc5ee843f1b01e6bde241b29f8494adced42e122f15d3521e5
-
Filesize
73B
MD59603b6e118964288bcb3dfe2c5609dde
SHA1204f614dc5fbd692b55ec8056cd4d063d96f38ae
SHA25611bbb92e7c2aff55aa4d1a6cff600fd1fd3d8ee4219b689a4f7c24de75a70f01
SHA512fd1b6d4995c99831d7a90954c0593788c073fd5490adf86d0f13edb4fa9cfb6bc4aa425f37aa7d59e93c2b3de655887af098fc70d7b4387f7548e77d5467ee2b
-
Filesize
896KB
MD59a3a0157e4687212b533cc7e456209fc
SHA1115722581d2bc23fe5476aab32e7489d480484d9
SHA256d09060e33eba81994db5d3d0f7b151a4e8ac781ea68a0c2bf8d8e5d9eb3662bc
SHA512a85edaf36b9cf6c7a10425a7190dbb3a7be99db4643eaaa8b352ce039771250202713664cdfd2812df2c53174a98db7d0766617cfedc4310dfb06123de24d35e
-
C:\Users\Admin\Desktop\@[email protected]
Filesize933B
MD57e6b6da7c61fcb66f3f30166871def5b
SHA100f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA2564a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3
-
Filesize
604KB
MD58b6bc16fd137c09a08b02bbe1bb7d670
SHA1c69a0f6c6f809c01db92ca658fcf1b643391a2b7
SHA256e67834d1e8b38ec5864cfa101b140aeaba8f1900a6e269e6a94c90fcbfe56678
SHA512b53d2cc0fe5fa52262ace9f6e6ea3f5ce84935009822a3394bfe49c4d15dfeaa96bfe10ce77ffa93dbf81e5428122aa739a94bc709f203bc346597004fd75a24
-
Filesize
2.7MB
MD550188823168525455c273c07d8457b87
SHA10d549631690ea297c25b2a4e133cacb8a87b97c6
SHA25632856e998ff1a8b89e30c9658721595d403ff0eece70dc803a36d1939e429f8d
SHA512b1a58ebcc48142fa4f79c600ea70921f883f2f23185a3a60059cb2238ed1a06049e701ccdab6e4ea0662d2d98a73f477f791aa1eec1e046b74dc1ce0a9680f70
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
Filesize
36KB
MD508b9e69b57e4c9b966664f8e1c27ab09
SHA12da1025bbbfb3cd308070765fc0893a48e5a85fa
SHA256d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324
SHA512966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
504KB
MD573d4281e46a68222934403627e5b4e19
SHA10f1c29cea7ea24ebb75c95114e0b0d26438e1d39
SHA256aac4ac970ec47cd95dc7c65d7d38d29c1f948be24d5dad1d5aa21053125367c7
SHA512bb7aad10e5accd3f5c0f6b2968973034a2f7c2523401eb234b2de0cdad2dc13f4fd58d08ece94ec06420a52b3d371ba832f8fb4741f48799703bdf32a4daf555
-
Filesize
3.6MB
MD5698ddcaec1edcf1245807627884edf9c
SHA1c7fcbeaa2aadffaf807c096c51fb14c47003ac20
SHA256cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b
SHA512a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155
-
C:\Users\Default\Desktop\@[email protected]
Filesize1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
Filesize
504KB
MD507b11cb395db18958049e7bf14140b06
SHA1b79d3c68918609ddfb17987c986e964481873f56
SHA2568135851e534d45c99be1a771ad5845eea5b83a0f920d34eca5cd4878d7bed454
SHA512d8e33ef0b58a9ca0b6e263f2a2f615a1a44f5e3a3f4b07927255ffee4213d3b60d5ef8dd6ee20f609e59e1957bf50db1df77161a997509694f2516f80e0c196a