Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/03/2024, 03:42
240326-d9ssfsfe3x 1024/03/2024, 08:51
240324-ksdersdh8x 1023/03/2024, 11:47
240323-nxzeksff97 10Analysis
-
max time kernel
612s -
max time network
613s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2024, 11:47
Behavioral task
behavioral1
Sample
Chaos Ransomware Builder.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
Chaos Ransomware Builder.exe
-
Size
550KB
-
MD5
8b855e56e41a6e10d28522a20c1e0341
-
SHA1
17ea75272cfe3749c6727388fd444d2c970f9d01
-
SHA256
f2665f89ba53abd3deb81988c0d5194992214053e77fc89b98b64a31a7504d77
-
SHA512
eefab442b9c1be379e00c6a7de9d6d7d327ad8fd52d62a5744e104f6caa44f7147a8e74f340870f9c017980a3d8a5a86a05f76434539c01270c442a66b2af908
-
SSDEEP
3072:9UJAYdi2YcRVm16Pn6tpzqJG/sX9i2YcRPm16Pn6ckCjSH5EyR9aKZt18rTu+i2S:9aiWm162qJEsNiym16ryAiym168
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/memory/1552-0-0x0000000000880000-0x000000000090E000-memory.dmp family_chaos behavioral1/files/0x000c000000023137-22.dat family_chaos behavioral1/files/0x000a00000002322c-32.dat family_chaos behavioral1/memory/3712-34-0x0000000000AB0000-0x0000000000BEC000-memory.dmp family_chaos -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 4284 bcdedit.exe 2524 bcdedit.exe -
pid Process 448 wbadmin.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation cs go cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation cs go cheats.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt svchost.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini.ma20 taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\read_it.txt taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\svchost.url taskmgr.exe -
Executes dropped EXE 4 IoCs
pid Process 3712 cs go cheats.exe 60 svchost.exe 3284 cs go cheats.exe 1392 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-983155329-280873152-1838004294-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cqk4zi3ch.jpg" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3644 vssadmin.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "156" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\3\NodeSlot = "4" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 = 14002e8005398e082303024b98265d99428e115f0000 Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 03000000020000000100000000000000ffffffff Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\NodeSlot = "3" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Chaos Ransomware Builder.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\FFlags = "1092616257" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a0000000b474dbf787420341afbaf1b13dcd75cf64000000a000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000e0859ff2f94f6810ab9108002b27b3d90500000058000000 Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Chaos Ransomware Builder.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Chaos Ransomware Builder.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Pictures" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\3 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe11000000230bd29ecc68da01e2fcada1cc68da01cffd34a3cc68da0114000000 Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e80d43aad2469a5304598e1ab02f9417aa80000 Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 010000000200000000000000ffffffff Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Chaos Ransomware Builder.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Chaos Ransomware Builder.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Chaos Ransomware Builder.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByKey:PID = "0" Chaos Ransomware Builder.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\LogicalViewMode = "3" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Chaos Ransomware Builder.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Chaos Ransomware Builder.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Chaos Ransomware Builder.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Chaos Ransomware Builder.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3548 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 60 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 3712 cs go cheats.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 60 svchost.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe 3284 cs go cheats.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1552 Chaos Ransomware Builder.exe 4752 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1552 Chaos Ransomware Builder.exe Token: SeDebugPrivilege 3712 cs go cheats.exe Token: SeDebugPrivilege 60 svchost.exe Token: SeDebugPrivilege 3284 cs go cheats.exe Token: SeDebugPrivilege 1392 svchost.exe Token: SeBackupPrivilege 4668 vssvc.exe Token: SeRestorePrivilege 4668 vssvc.exe Token: SeAuditPrivilege 4668 vssvc.exe Token: SeIncreaseQuotaPrivilege 3820 WMIC.exe Token: SeSecurityPrivilege 3820 WMIC.exe Token: SeTakeOwnershipPrivilege 3820 WMIC.exe Token: SeLoadDriverPrivilege 3820 WMIC.exe Token: SeSystemProfilePrivilege 3820 WMIC.exe Token: SeSystemtimePrivilege 3820 WMIC.exe Token: SeProfSingleProcessPrivilege 3820 WMIC.exe Token: SeIncBasePriorityPrivilege 3820 WMIC.exe Token: SeCreatePagefilePrivilege 3820 WMIC.exe Token: SeBackupPrivilege 3820 WMIC.exe Token: SeRestorePrivilege 3820 WMIC.exe Token: SeShutdownPrivilege 3820 WMIC.exe Token: SeDebugPrivilege 3820 WMIC.exe Token: SeSystemEnvironmentPrivilege 3820 WMIC.exe Token: SeRemoteShutdownPrivilege 3820 WMIC.exe Token: SeUndockPrivilege 3820 WMIC.exe Token: SeManageVolumePrivilege 3820 WMIC.exe Token: 33 3820 WMIC.exe Token: 34 3820 WMIC.exe Token: 35 3820 WMIC.exe Token: 36 3820 WMIC.exe Token: SeIncreaseQuotaPrivilege 3820 WMIC.exe Token: SeSecurityPrivilege 3820 WMIC.exe Token: SeTakeOwnershipPrivilege 3820 WMIC.exe Token: SeLoadDriverPrivilege 3820 WMIC.exe Token: SeSystemProfilePrivilege 3820 WMIC.exe Token: SeSystemtimePrivilege 3820 WMIC.exe Token: SeProfSingleProcessPrivilege 3820 WMIC.exe Token: SeIncBasePriorityPrivilege 3820 WMIC.exe Token: SeCreatePagefilePrivilege 3820 WMIC.exe Token: SeBackupPrivilege 3820 WMIC.exe Token: SeRestorePrivilege 3820 WMIC.exe Token: SeShutdownPrivilege 3820 WMIC.exe Token: SeDebugPrivilege 3820 WMIC.exe Token: SeSystemEnvironmentPrivilege 3820 WMIC.exe Token: SeRemoteShutdownPrivilege 3820 WMIC.exe Token: SeUndockPrivilege 3820 WMIC.exe Token: SeManageVolumePrivilege 3820 WMIC.exe Token: 33 3820 WMIC.exe Token: 34 3820 WMIC.exe Token: 35 3820 WMIC.exe Token: 36 3820 WMIC.exe Token: SeBackupPrivilege 1348 wbengine.exe Token: SeRestorePrivilege 1348 wbengine.exe Token: SeSecurityPrivilege 1348 wbengine.exe Token: SeBackupPrivilege 4736 svchost.exe Token: SeRestorePrivilege 4736 svchost.exe Token: SeSecurityPrivilege 4736 svchost.exe Token: SeTakeOwnershipPrivilege 4736 svchost.exe Token: 35 4736 svchost.exe Token: SeDebugPrivilege 4752 taskmgr.exe Token: SeSystemProfilePrivilege 4752 taskmgr.exe Token: SeCreateGlobalPrivilege 4752 taskmgr.exe Token: 33 4752 taskmgr.exe Token: SeIncBasePriorityPrivilege 4752 taskmgr.exe Token: SeDebugPrivilege 1084 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 1552 Chaos Ransomware Builder.exe 2668 LogonUI.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1552 wrote to memory of 4952 1552 Chaos Ransomware Builder.exe 117 PID 1552 wrote to memory of 4952 1552 Chaos Ransomware Builder.exe 117 PID 4952 wrote to memory of 1492 4952 csc.exe 119 PID 4952 wrote to memory of 1492 4952 csc.exe 119 PID 3712 wrote to memory of 60 3712 cs go cheats.exe 123 PID 3712 wrote to memory of 60 3712 cs go cheats.exe 123 PID 3284 wrote to memory of 1392 3284 cs go cheats.exe 125 PID 3284 wrote to memory of 1392 3284 cs go cheats.exe 125 PID 60 wrote to memory of 4204 60 svchost.exe 127 PID 60 wrote to memory of 4204 60 svchost.exe 127 PID 4204 wrote to memory of 3644 4204 cmd.exe 129 PID 4204 wrote to memory of 3644 4204 cmd.exe 129 PID 4204 wrote to memory of 3820 4204 cmd.exe 132 PID 4204 wrote to memory of 3820 4204 cmd.exe 132 PID 60 wrote to memory of 4568 60 svchost.exe 134 PID 60 wrote to memory of 4568 60 svchost.exe 134 PID 4568 wrote to memory of 4284 4568 cmd.exe 136 PID 4568 wrote to memory of 4284 4568 cmd.exe 136 PID 4568 wrote to memory of 2524 4568 cmd.exe 137 PID 4568 wrote to memory of 2524 4568 cmd.exe 137 PID 60 wrote to memory of 3860 60 svchost.exe 138 PID 60 wrote to memory of 3860 60 svchost.exe 138 PID 3860 wrote to memory of 448 3860 cmd.exe 140 PID 3860 wrote to memory of 448 3860 cmd.exe 140 PID 60 wrote to memory of 3548 60 svchost.exe 144 PID 60 wrote to memory of 3548 60 svchost.exe 144 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder.exe"C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xny2v1ie\xny2v1ie.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7574.tmp" "c:\Users\Admin\Desktop\CSC30DFECC22B1042E58AA0F7DCD868ACB.TMP"3⤵PID:1492
-
-
-
C:\Users\Admin\Desktop\cs go cheats.exe"C:\Users\Admin\Desktop\cs go cheats.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:3644
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:4284
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:448
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:3548
-
-
-
C:\Users\Admin\Desktop\cs go cheats.exe"C:\Users\Admin\Desktop\cs go cheats.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1812
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1308
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4752
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa389c855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD528d7fcc2b910da5e67ebb99451a5f598
SHA1a5bf77a53eda1208f4f37d09d82da0b9915a6747
SHA2562391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c
SHA5122d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6
-
Filesize
53B
MD5306215148dfdddecdca3e0d9d8b6e8a0
SHA161850dae13aaa1b2492092244db18d57658d3e7c
SHA2564fe65655965af5b21f69e513ff63594584ed4bd1773a902f571ce3346d4969bb
SHA5126a71652a7ac3a5b6a0464d4876ea3eacbd085b64e6998f302b966fc57cc29d332b7996beb96cc36de196cf75563a066caaa38a3ec5d17c8766c5840a574e25fd
-
Filesize
397B
MD5a7644bd42e36fd49420b27c6fbf80a1a
SHA15361985c8265fe96ecf28ff1fa8c04d31c0a183f
SHA2564612cccf419770ca20fec849f2a581bccdd3286c107267743edeaab0a7a804c7
SHA512fbcf06caf5330c1467e494ceb11c444f97b7763776b598eb482ecd881af60144d01335d23447f92127c964d6a3db0075c41d63b7ccfc4769969e7abd83df86cb
-
Filesize
1KB
MD506341a508e6c38f17b6fbbc69ea0c544
SHA1be07f0b34cea34332e89c3b782b9ef50c5cf1d53
SHA2561513ea1d5935cf8fbeaee54572da656a70602cc4b376bfe0ce997426b2ae0f89
SHA5124d355109b661cb562ddd8c35b30d24541fff8b6fda473ba871ac4364ca84ec7715ec0a8e015012937df4073e0191bd432028e9f62273cf9f45b78aad3b0663f9
-
Filesize
57KB
MD56a16e2a6bd8698747848f67d03e9e852
SHA11b677667e679c823dc4268aa9a76c1581e8d95e9
SHA256f8af4b2574c043d8db7143291356fea0a939b1311c74e4ba87dd6801b8c1f55f
SHA512a314ec33cf31a3ee9c322a26d7f32c965075e5ffb9b5713aea9be62ac1c3c28f4ea2f6c3283412215d624d0749b3e640f6df9e78d471d1edbb9f6e647b6e56e1
-
Filesize
181KB
MD538de32a9c13f9c27bef1fbb07df8dd9e
SHA15e4c0c4c0369e4696732c449c8a1db5e6ef923b2
SHA256334b0a2a5b5561e52d01472887c299c37a46ad228450e86a8ae0c8cdac922bc1
SHA51213883a76412382620b8da314fcad2b6337b3131ee984c6268885316e0b111d5b1dafe27e9958178caa366115b77f82a3899ad83f655f523cd2e16fe8adf88111
-
Filesize
13KB
MD5df855ce7e88a8afcc01d501c4014128d
SHA16939baf5e6df2ed3f8054918d6bbf47500c36ce1
SHA25619992eb51ea2c9b4f2d69a3f3b66bfb38d8de5a50fa911623dd1206b1092bb5f
SHA5129ffd284660dfd5efd30a705b828681163861d144eae3548e50ad2e5413f73d9a18fb90559ac897d0f11224c5be09fc3e7844ce29fe77f7d8842d6020ffff5eaa
-
Filesize
93KB
MD56f33033740479b0c6e87e896b79a1de0
SHA18f7e146302ea2d458cd1d83d757f97dd3c8d3110
SHA256599bedd2361568882293ec390671f8b1b97332ac9083d730bab3390657633bcd
SHA51210baffbd8b734650caa2c093fa2754aae1e54abf0992139500c60e337ea821fe9b07a2be373ffc013ecc3aa5a69ecd0115cf33d4bba2a24b3fe2817b0949a4c2
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.25_(x64)_20240226160625.log
Filesize15KB
MD5d0f54eb1bfca61ba2d2b30cd05673a6f
SHA14ff9750999363278a5a44188c124b64d608132f8
SHA25669a1d47a09bcc81857aaf8a2684ea9fe9612749716471e94a5bf80ef3738784a
SHA512e6b1795bd5aa0246663becec89eff216c972e6a0138b4c45265ad719122d519423b21442950a93b70479d733ee360d98ebc298bb8b1c32aa748b8d46fd24480e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.25_(x64)_20240226160625_000_dotnet_runtime_6.0.25_win_x64.msi.log
Filesize551KB
MD56f6a8b70df2daf8b4a2a1957cebb0522
SHA1de0f0a0baf5d8f908d0193cb05c3f2859315118d
SHA2562935ea1fd4a238fb2d795570d49bb0e1b11b1ab19b60c362f2eea2e690af8a7d
SHA5123a51b327eea3e73581492339ed88404782121ac269cda7f9fdb19a192fd3d0065334cc88bbff901ec01bd48e32038793ce62959ff56424cf5ba1762da0b0fda6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.25_(x64)_20240226160625_001_dotnet_hostfxr_6.0.25_win_x64.msi.log
Filesize95KB
MD52bae6fdd2877d1214b22afc2a3fa5e35
SHA1bed7ae237b99a235b62a1e2c0adab5eeefaa746c
SHA25675f3b7785b9e622bf0e78a5f1fe995a0bf72c2d5d104e1857335b00f67ee38cb
SHA512859f6e1b2695142caeef12f5f7c18a3974d9640253fed8bd7b52cf27a7b192e5e8a0ea0b069086d2756af7999b9b791d7d1c92db69661980939281e943869087
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.25_(x64)_20240226160625_002_dotnet_host_6.0.25_win_x64.msi.log
Filesize105KB
MD5b08d03a3c2915387f97ae14075b6233a
SHA1cac6d25e5c8fca69c8d7669af67227ee3805f863
SHA256ee21a4a8eec4b1380899df28eb60859f452debdce13409b438f687b3955303a9
SHA5124e54441716af36a28321dd63f4e1fb16cef87d0447e1595b11f6f20105d1e0adaa52061312461b33a7ddbaf52e69fb5f663e926bfc4b49c326ac596fa2a158ba
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.25_(x64)_20240226160625_003_windowsdesktop_runtime_6.0.25_win_x64.msi.log
Filesize849KB
MD599e1da1908fdb563ab39c0204df0608c
SHA17738578f4d9ee01b069dc99f97ff6df36a5ec90b
SHA256238021e307df9b22311f420c1932736a2476e764f93fb6bf7c8e12f775184491
SHA5124c99ece00382f809d728fe1d0e43c06b3437fac2fab5f5bff6dede670cf9447f4f773736d7bed6cb4a69e78c8740f61983f717e6674c421ada02fb5cbc0306e9
-
C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_8.0.0_(x64)_20240226160708.log
Filesize15KB
MD56525fb96c306c332e5c9d44e8d3c578c
SHA1fd56e498884c7c16a7da599e73b874f770677387
SHA2562f7696929a1f5954cfbbfd10b4caba411b1ed6cce9fd2e8a51dbbb85fd00c533
SHA512a96e435b3e6e484899fa19da6c5e67a08f0567264ecb5f0900ce5f93a6487a9847b42c335702a2c46c5470e75082d32214de652ae3944fb35da4b716d724cf60
-
Filesize
1KB
MD5b2b34f49edc94f3a5fc932a1bb1e1866
SHA12cc4ae9906f64d4232d3abf53070463303a035b2
SHA256a82c42cb9866be55d9d6bac990e472412b711602dae6248858228736cb34da7a
SHA512a0cb2c7c412c9d211057e70fd64ce9d92862875d3783de4709c23746628d6ced06c69cc22b59d42457ff5601205d6750a1fe75b96fd75ccc5ee480f716fd60df
-
Filesize
470B
MD5a6825c7252e78c4db2108fecd17dc75c
SHA1a036fb3ec82ea604e9b87b319b4b1b883cedf9da
SHA25674f478e144a356ca393e41e798a7f1d05072560d86b95d099ea8980b51f2b073
SHA5125d33c4314317d6a932f97471a39e4e7541412e877c46558159f178c417181bf6516dfffa52aa0cfdfee8483c2746c8c7e54442dfae8a8f236e5ab1464eb1cf74
-
Filesize
6KB
MD5d0d9f87e424e72a3dd34c35333708ee4
SHA19e164478dad84078bca6f7ffe5b4349238b17660
SHA25643e02f6861d01d2ab6fd5a9a5cebefb48ac2e534a071d36b758607d22c4470f1
SHA512bf26f35f29cec6f892335c0bebf6865727c804ce6c58403514114434ca37071bbf92c8fddd9a83062046a2940957edb14c7386eefc847c69e26ce353ce967ea1
-
Filesize
457KB
MD517889ec41ab3bd83e30ab54161f3c3aa
SHA104c253c672ea7a85fd0eae43bb01bf82059d9dac
SHA2569899c79af2bca83ee873c053febcd2cc2d559580fc1c55fb301d7e8b782d5854
SHA51240aac0c5f9131924b45f6905271581f8aa32acd43d129cf54fe12d64f7e4c3eec0878404becea5bb422232a5416a0a543ac99c69f574b30e5e06887b3b76ddf1
-
Filesize
1KB
MD5e9cac14c469fa28d1d7335d426283162
SHA1ae16be05a6be98c9654fd01b471e591f6c4bc030
SHA256a460c1a6d4fcb81a308990b73df8887e019501a2a34f4549bdbc911ea6c0616b
SHA512ba5877ee4c2827a31275cc22eebd7cd6bf085c31c829d6d96285de52d2483f64d40797daef71c3c45e85186f116ff5b68c10df8606b6faef9ead9fbdcf95cbbb
-
Filesize
427KB
MD54535ef5999cb6389c8281ab2521d43ed
SHA1c0404b87521382dec08aa878a83b0021a72653f8
SHA25657c84cbf23938f510ec234ff3cfb724459aa0eb95dbb86820048c5760e410288
SHA512d01447c585b818ba15a3215db374825b6e25f20ec09caaa3e0f55954dea8b93391bbeda6b588e8ad064f5c2bb144a4a2c9ff4b7e8a5e99bb369d2830e72d0395
-
Filesize
416KB
MD548d548dc7b2fb537178ef69d2fbad987
SHA15e9fdc225dff9a2b4f0132d27aa45408c6b7b1db
SHA2566fe0c9f02539240b215b2afc94613accedf32e531d896b6fa6179bf4c5f6ca29
SHA51237c1ce717348919cfd8bafaa0714b790587e8ae9bfe09b13d348a840a84d4b68c1aedf2988243ce48e2f3e3d17fcc2601131ce836463a150a2f439738b82a273
-
Filesize
11KB
MD50b46662bc6fc4ba3f81f5161fe26cff5
SHA19d3b5b27dba2783db787594826bae1527b3953f9
SHA2568509b559ff81edcdd7cd249e6ea15c0c94b6f27c333c54ea041ca7579fa1c5ac
SHA5122416f1d2b62fa020e6d6e84dad288ba61cfdd8b858d76b6d4ed3978da428bccbcba1ef14cf7956bf99be15171665b93623593c566e8f9006dd4a09b710e6c8eb
-
Filesize
11KB
MD53407fc3198d6041b52fe04c75472a6e1
SHA1d4e5ced551b401f409878e816334e9df0aeea30c
SHA2561db4d460e5e5215ac70c3275693297dc3f0bdb0361444ec1a727cd3bab7b24a2
SHA5127eeb5b73e5ba56faa1cc0c2fff6c6a0129bae49ab5f69a0aac88ff0d98013821f7ff1624a6ca175ca18cf28a7f1271c58296caa3b760b9e0ec47d604f2c5ff4e
-
Filesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
Filesize
153KB
MD5621b739fd58d24876b895f17e9e9f3f4
SHA1eb80edd1b89c95df33b1eef20530e15f03cb835a
SHA256fb354420ebeeb45ed4307cdace7167b78dc9176629d2358322bfbe97c5a2fff7
SHA5126cee6da130b20b47467c986ce3eda891f4334a72ad80436c5a1c4871d5d7ece19c01db0bec3199b2512d36281b2f26dc9ee47d5b61b134f56c4d2f5f55c1d2fd
-
Filesize
436B
MD50224dc7129519ce4d84779dcdfaf656a
SHA1f4f1e40a30bb9502ee6b0878ce6cc078b03083ae
SHA256cc3ade22fbd3367e4477102b4119e08bd341189a96f5caf79cf59db5582f6da7
SHA5122460d11be7ea39ed928b8ffac0425de467f8d9baf6a7c9923be1e4fa80adb8752fab3973492537e8c0b165668984ca8ee5ebc322be2d72f0a6d8d80aceb7c6e1
-
Filesize
142B
MD51a09a38485cbf1d59c29d8e3213e1ab9
SHA19cbe6ebd07b13a0d4b2565dc15a273629aa97251
SHA2560a3bdc40dc0d243784bc5fa887b79110350b3d3200684f3ba99880fcea40e3b8
SHA512a33c228196a4b3f14e40ac6ccb6c43002de28063594c472db852bedac20a6725f4e7601b9f32516e2c6bea35f83746973b3f1d200d9e5d668bda7553b62ac616
-
Filesize
812KB
MD5c2cf29426c262a289f26061687d45be7
SHA1303a03360c5afc29b746592f203334dc1afd6534
SHA2564147b7e0c0f55696390e69d7e7afeaf0c9d023a0e1945417d53b63c6750ae280
SHA5123c1aa22856db4902219f02c817332c32efef9ed1c94c2eaf5a8137359a53752f21934647ae08c5f15b62cb7405b4bfcbf92abd484f026a01cb5b6a0162e72053
-
Filesize
1.2MB
MD5944765474d1095e82f49305eb97f5eb7
SHA15e1e5c58a143dfa7532d8c7dab0c9951b948a1cc
SHA2565b51b6de226f11a27c776488c1d454027cac6aed09784efcb70d93836e8cfc09
SHA51203edbc201dedd823f818160a3a5bd1929abea95432707a350384a44505920b9e10e56166a2c6feb187c807bb635f1c3a30fa8596dd67d638ee9923c7a259f703
-
Filesize
8B
MD5739389ad8f18404863d24d138a4dfb70
SHA16bbe895e5f307bc2ebf876b7fb3120c2086c58cf
SHA2568235ae9fab4ab01ca7c181ecb8d094b58cf1999af0700feae504561afb69c09e
SHA512ffb12f936357f5f5220d5a78df24066d84ae9495958dd0762ac9f7d1df3f8277a4981baece4eb1feef7d6745758dc2bd4a3fd2a6d357e1d2d10e9d310b63d39e
-
Filesize
7.2MB
MD5e79cbf4b8cef12fc28460c57083f1186
SHA13ef31989b8d2199edd8e01997656ce4e0dd5e18d
SHA256d95c7b2e5cac794ad6116e26a9bd394164c2f29775cd8d419d57b513ab974bc2
SHA512a43193ff935df9dc4ac0cd1c1d3f51a50d8a17f518af18a47ce67a825b0e6065a5b8cb05cd2d44e746c863bc4b5232facffd250d836a13ca7417ee4d50f4e06d
-
Filesize
380KB
MD59412eab52c23b200bfe27eacb1862349
SHA18b0798e7a4db80b3773c8c42f7cffbcec8326130
SHA256829a125e5f83650081e6a0135231f82b62ec0fee40b68653ba9f71f66d2e4316
SHA51264d2786187b64629cddc930e8100381d80b787a29fe50be2f189e0601f9ee6a27eb8c7ddb9bffe705cd6e34d67d65168d8464c48052aa7bf514719f0dbaa7769
-
Filesize
86KB
MD57631b765f193c01c392cdcfed056f82b
SHA1912b078ace304a7a4f0b94434f330669f80b7221
SHA25653ce916649818842bf7a82f27837bb3ad5648ba1e7858669534df30b1ca92a71
SHA51231da7baf73c4521bdd53336ea1015c223f316c10582e0aa3f5968f01e1896f154edfafbc2938b2fa043bbd0de27bb8f374fd8d963f2372df77c5fd98d3939ff8
-
Filesize
395KB
MD5c35b66fb7aad24e26a89da695c14946e
SHA10de5c0eb0592378fcea90384556881b954254c1c
SHA256fc4822c03e3ce76c3f5b0a5daa12affce28cefb0ef33161d1d26b4ce4ec8998b
SHA512abff78a8c52ca4278b16f998d07d266a8c1a603d32cf83f3e06683c55e89d060e927babaee94ee127f20ee980b1c1c275537f0beee94c07f0569ab7c9f3e0f83
-
Filesize
80KB
MD5d5b60929d748e93c0dd676a00aec5698
SHA19aef20394e798f685674c811c235873b49daf84d
SHA256badabe7b4af2e2429a94f2a9608aff88c72992e3ee54787991fa205bb91bbb82
SHA512a0d058c5338b761e4d96afad599ba064d65d06c9fb596796931254ba101a56a8967ff709edade163882e65916828da4b6af7e8a5fcc598845cc1f82dc3638445
-
Filesize
168KB
MD5861c17524cdc6940fe9d7552938dff39
SHA1e12d6a271e385e3eeb18a8cc7fea0934547eee05
SHA256320bf8b97f1e816055dfbaae959f8fd0221343c19402cb8b365697ce31b62f77
SHA51208965c719951498896d8f4b3724f3b25eb23489b7624bff252b20abdd98da1b08efb4404d485a9b52ad820548ce84bf1cbf979a495f1817339ae523020bdeb0b
-
Filesize
195KB
MD5a27f5bad578205f7145b7ac3663b5c32
SHA1e16afe1b40d31e98a549573fe2e0c4a74d91ff6c
SHA25662f4df2dcb1c7ee2373c23f97689a9cfba1263501d2f7094281f4cd5cce5689f
SHA512fa7e5c5a5f1b7df2dbdb663bc79bbb57414a86a22e8d44a444d803c226b0c6874049ba90228109bb2a95e252028c4c67a18c4b9fa584fcb35a50d0cf005b0e31
-
Filesize
171KB
MD5e08edfbea54d9505cbc42726c50d1a47
SHA103448963f701a3caf9cee5386d3a24a166586f82
SHA2569a92879369170caabcb878eeacf063db9792d9a67f361c29088b4c4dc35775c2
SHA512e7e00730274669e09f40e66c58fe74d1eb5c808b829e27f10153d7e94ebd9ef8966613791f3288ad2d780a590e8a2eb45c82bd3f2bbf65429c99bf39c93e3741
-
Filesize
208KB
MD560c8750fc057d296ef7ccd6b6a06b4f7
SHA1bc81f2dbd088582fa5e9b8b6b7cf09c1d735d1c6
SHA2568241549f5caa14629e530b8bf9369df9f363f869d0c749f44881729381cd1ccb
SHA512658aa38c6c53c3b6f2201251f52d8acef0123aa2a7c681767c139a1eed7bdc0f43fe03cb67bde2fc39a5fb56fd65943821554d62846a03423c1a520caa6d11a0
-
Filesize
170KB
MD5a7c473ccb44debcf06cdd7aca08ddfbc
SHA1dc48fdb8d1da8dfc0c04e4aff180712f2abea765
SHA256a5b539a40e4d05370f779c44c931cde569da2783051cbc760269260092613d30
SHA512e1a3c83824dc3dfa96345860bbc762ecdee54808e2a87bf9879acf08f61633ca1c5c71edae5e79266c30ee7d8282757d62e49c7b9b2e1b36857f4de6ab943b54
-
Filesize
190KB
MD5d21e548c53741fc17d0cb2f55ad7667d
SHA158d040687a3e344605c43035e9884a4e0f07461d
SHA256a925c55032643fdcbfb1382149d261233fd923de3c963fd73c401b3c2bb36898
SHA512387b87d2186ee465276a361c6698a1e9aeb687255ffa5b5e18239bf2c625c364a073ae49d14c98d2a4785cd73e29664b3390ae9c0a2961dbcf703638fe1c2688
-
Filesize
170KB
MD598443db47e0c30ce7b095d26f540c03b
SHA1cc1324af291a8f714de8b7dbf2dfd11e0e3c1fc7
SHA256a429c25a39d83913a7370fb45475bb6e8ec687d972bd6b95eb30a9c9372b38f0
SHA5126668aa8c5e6d0734f2656e8a5eee0af5cbabfd419c23736aa6c4340f2ee325748c25a49ea79f9203a6ea133af628d4180a66ea3619a35296fe3662b5c2bc67d7
-
Filesize
198KB
MD54687c217498778c703775232dfead1b1
SHA18bd1330dc3a321ad2d0b2c9f4e8b960ffabf2b65
SHA256dedaa47dc02aeadc04fafc744f7947389a4bfb1e5de284bfdb448d568089af80
SHA512e83aba1506db1b6bee107e5651e8eb4edb88db387bb34190a40053c19fc0a2ae1213516d24192f0acad399c2c7f9292f5302cb66baa0da35e38ef6f06160b897
-
Filesize
123KB
MD596d373c0e13466293030b4a270ab6080
SHA1899d2cc51fe5b7f807781c217390edc160961b39
SHA2569207e0ce4955856ac22efcaf4a81246b46e34748e974b93583f6ae0d23f8297d
SHA5123bb1a76f22055784c0883beb367e3eaf6a9b0b628c65f1d549993ae708210b7a3a2aafc6440bad008d4d6c42c9bd28106eac7cd699c91d776b8335f4c2c4f07a
-
Filesize
129KB
MD507be6c897e514b7f45aeb1d83babbce2
SHA1ad7c89d34886e1c9c9aec4c28e60e084761a6efa
SHA256fd2333ac1151fbda8c43c433024e41419798610c7d623b7d136ffd8bf3cd3690
SHA51254fa0ddd1b5dcf1782dbfdb1bd9d2a77a125f5029d9727e1882529db5696d34ea31749124b8939f4f25f4990a02ef7ff2b48955d0009d06c6d42b8729170148d
-
Filesize
123KB
MD58d964851dcdc3f94a3e11542b331f89a
SHA1c4fd1bc70d97a48826ced0df2bf6a8ab639450e9
SHA256b99c5faf359c18d32f188ec979d58a8899e8f8edeebde6fea2aa5189afce3cb9
SHA512b757485f12625d4f987df7b542ce54f5790ebc9ae1d01a17a6f976684b5380507002f0a74f1c600702c2274fcdb9c1de97fdb761ea0582142b9d641f656f3323
-
Filesize
135KB
MD58f99fd9f2c3bb799d6e34f3897b79c7c
SHA163d4a68f4588e97060ab670dbe1cbb3c0f22a823
SHA256cdb680985b7e6c40be725e47e2413eebee28048fb7ac700816422aa2bc90bec0
SHA512fda1e78671bc05352e89808bea01c2a903c69faf25baa29b9e18598d68d13c6308e07159f49a77587cf7f98580688d68612fdef3f6f063cd5a09c8cede4d34b4
-
Filesize
639KB
MD5de4d340de974c446c6de8a7e8503bd9c
SHA160961486da4b4bd70c8e9c7150603442e7e57e1e
SHA256a74ed2e5d6f8691580d24fac91c0c3c7743f98e629a5a10c0defc4e16e59a48e
SHA5126c1125ccdd9e9ee2bbb9b736b8b14c3af346e0e039b726501825a6c1cc959600ca1010ff5dce91b094d84ea2c1fac1077e91d67ab9e07c1b43ac5c64b01bd5d1
-
Filesize
338B
MD55928255919d26cf5f16653d1f469f6df
SHA12ca9f5a6f43bbd8a75f8596b7231cfef417a3803
SHA2567854294180c5e8750d4e57211eef3bc7c0debd19ad67548963095261d5778947
SHA51290637ccc246c490e832b7f4e7b9b0844f0c504be1e8fbfbc2e8291b29f3d08bb92be970f24fff7e1ea4bf6fc35a2223f15ce76fde63219d50329becb19a9f064
-
Filesize
1KB
MD5d49dde1bb5d8afdc3869c23449997747
SHA1400d15b447fb8c336fc6aa43633d80f726b0283d
SHA256dbb765e226a516eaf39468bbe4087f0d0cd8ceed3127ba8e248839c086b84206
SHA512b12a46898131b7306be3a17c92a523dd88156f24763e706f381d50e744d6e072bc1e2c36db2c15557cf4e7195e570053a311852033f8e118302093281f403db4