Resubmissions
20-09-2024 07:47
240920-jmh8dswane 1020-09-2024 07:46
240920-jl2ckswdpk 1020-09-2024 03:56
240920-ehjadaxcqb 1020-09-2024 03:35
240920-d5fx4awerf 10Analysis
-
max time kernel
16s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
PCCooker_x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PCCooker_x64.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
PCCooker_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
PCCooker_x64.exe
Resource
win11-20240802-en
General
-
Target
PCCooker_x64.exe
-
Size
22.4MB
-
MD5
317c5fe16b5314d1921930e300d9ea39
-
SHA1
65eb02c735bbbf1faf212662539fbf88a00a271f
-
SHA256
d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
-
SHA512
31751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
SSDEEP
49152:yIT4lj7Rl9HFoDi+3JK5CS2bV5IRtyrp63FDysl28Wvp/pUOmrscrdXuMIgqJ95+:yI6
Malware Config
Extracted
marsstealer
Default
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
uGoUQjcjqoZsiRJZ
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
C:\Users\Public\Documents\RGNR_79532DF1.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Signatures
-
Detect Xworm Payload 50 IoCs
resource yara_rule behavioral1/files/0x00060000000055d8-57.dat family_xworm behavioral1/memory/1812-65-0x00000000010D0000-0x00000000010E0000-memory.dmp family_xworm behavioral1/files/0x0003000000005666-66.dat family_xworm behavioral1/files/0x000b0000000056d8-69.dat family_xworm behavioral1/memory/804-70-0x00000000013D0000-0x00000000013E0000-memory.dmp family_xworm behavioral1/files/0x000e0000000057d8-76.dat family_xworm behavioral1/files/0x00050000000057e4-81.dat family_xworm behavioral1/memory/2380-73-0x00000000012E0000-0x00000000012F0000-memory.dmp family_xworm behavioral1/memory/2152-83-0x00000000002B0000-0x00000000002C0000-memory.dmp family_xworm behavioral1/files/0x000900000000598d-89.dat family_xworm behavioral1/memory/2332-88-0x0000000000D00000-0x0000000000D10000-memory.dmp family_xworm behavioral1/files/0x0003000000005abc-95.dat family_xworm behavioral1/memory/832-93-0x0000000000DB0000-0x0000000000DC0000-memory.dmp family_xworm behavioral1/files/0x0007000000018e46-114.dat family_xworm behavioral1/files/0x000400000000f38e-111.dat family_xworm behavioral1/files/0x0004000000005b17-100.dat family_xworm behavioral1/memory/928-107-0x00000000012D0000-0x00000000012E0000-memory.dmp family_xworm behavioral1/memory/1604-115-0x0000000000A40000-0x0000000000A50000-memory.dmp family_xworm behavioral1/memory/2964-106-0x0000000000170000-0x0000000000180000-memory.dmp family_xworm behavioral1/files/0x000300000000e6f6-103.dat family_xworm behavioral1/files/0x0004000000019308-129.dat family_xworm behavioral1/files/0x00040000000192e3-125.dat family_xworm behavioral1/files/0x0004000000019319-133.dat family_xworm behavioral1/memory/1256-122-0x0000000000D30000-0x0000000000D40000-memory.dmp family_xworm behavioral1/memory/1996-134-0x00000000003C0000-0x00000000003D0000-memory.dmp family_xworm behavioral1/memory/676-119-0x00000000009F0000-0x0000000000A00000-memory.dmp family_xworm behavioral1/memory/2476-135-0x0000000000EA0000-0x0000000000EB0000-memory.dmp family_xworm behavioral1/memory/2472-142-0x0000000000DC0000-0x0000000000DD0000-memory.dmp family_xworm behavioral1/files/0x0004000000019329-144.dat family_xworm behavioral1/memory/2632-158-0x0000000000BF0000-0x0000000000C00000-memory.dmp family_xworm behavioral1/files/0x00040000000193a5-157.dat family_xworm behavioral1/files/0x00040000000193b6-165.dat family_xworm behavioral1/files/0x000300000000f6f5-167.dat family_xworm behavioral1/memory/2744-164-0x0000000000AB0000-0x0000000000AC0000-memory.dmp family_xworm behavioral1/memory/2960-170-0x0000000000390000-0x00000000003A0000-memory.dmp family_xworm behavioral1/files/0x0005000000019393-176.dat family_xworm behavioral1/files/0x0002000000010309-179.dat family_xworm behavioral1/memory/2736-185-0x0000000001210000-0x0000000001220000-memory.dmp family_xworm behavioral1/memory/2004-184-0x00000000003C0000-0x00000000003D0000-memory.dmp family_xworm behavioral1/files/0x00040000000193d5-183.dat family_xworm behavioral1/files/0x000400000001942a-190.dat family_xworm behavioral1/memory/2584-191-0x0000000001200000-0x0000000001210000-memory.dmp family_xworm behavioral1/memory/1792-194-0x0000000000840000-0x0000000000850000-memory.dmp family_xworm behavioral1/files/0x0004000000019461-197.dat family_xworm behavioral1/files/0x000400000001946b-205.dat family_xworm behavioral1/files/0x000400000001947d-207.dat family_xworm behavioral1/memory/2844-208-0x0000000000D50000-0x0000000000D60000-memory.dmp family_xworm behavioral1/memory/2320-210-0x0000000000D10000-0x0000000000D20000-memory.dmp family_xworm behavioral1/memory/2504-209-0x00000000008B0000-0x00000000008C0000-memory.dmp family_xworm behavioral1/memory/800-211-0x0000000001090000-0x00000000010A0000-memory.dmp family_xworm -
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x00040000000194f0-729.dat family_phorphiex -
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (107) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ad7a7c16.exe explorer.exe -
Executes dropped EXE 32 IoCs
pid Process 2064 4363463463464363463463463.exe 2096 a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe 1092 asena.exe 2740 Bomb.exe 2692 CryptoWall.exe 1812 25.exe 804 24.exe 2380 23.exe 2152 22.exe 2332 21.exe 832 20.exe 928 19.exe 1604 18.exe 2964 17.exe 1256 16.exe 676 15.exe 1996 14.exe 2476 13.exe 2472 12.exe 2632 11.exe 2744 10.exe 2960 9.exe 2736 8.exe 2584 6.exe 2004 7.exe 1792 5.exe 2844 4.exe 800 3.exe 2504 2.exe 2320 1.exe 3332 Vamg.exe 3460 t2.exe -
Loads dropped DLL 10 IoCs
pid Process 2468 PCCooker_x64.exe 2468 PCCooker_x64.exe 2468 PCCooker_x64.exe 2468 PCCooker_x64.exe 2468 PCCooker_x64.exe 2468 PCCooker_x64.exe 2468 PCCooker_x64.exe 2064 4363463463464363463463463.exe 2064 4363463463464363463463463.exe 2064 4363463463464363463463463.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*d7a7c16 = "C:\\Users\\Admin\\AppData\\Roaming\\ad7a7c16.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad7a7c1 = "C:\\ad7a7c16\\ad7a7c16.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*d7a7c1 = "C:\\ad7a7c16\\ad7a7c16.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad7a7c16 = "C:\\Users\\Admin\\AppData\\Roaming\\ad7a7c16.exe" explorer.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: asena.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com 21 ip-api.com 22 ip-api.com 23 ip-api.com 24 ip-api.com 25 ip-api.com 5 ip-addr.es 7 myexternalip.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 asena.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tabskb.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcor.dll.mui asena.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg asena.exe File opened for modification C:\Program Files\Common Files\System\ado\adojavas.inc asena.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\oledb32r.dll.mui asena.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tabskb.dll.mui asena.exe File created C:\Program Files\Common Files\System\es-ES\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui asena.exe File created C:\Program Files\DVD Maker\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkWatson.exe.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif asena.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\System\es-ES\wab32res.dll.mui asena.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\tipresx.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\msinfo32.exe.mui asena.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msaddsr.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipTsf.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\rtscom.dll.mui asena.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\tipresx.dll.mui asena.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt asena.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\micaut.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\IPSEventLogMsg.dll.mui asena.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Seyes.emf asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee90.tlb asena.exe File created C:\Program Files\Common Files\System\msadc\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\IpsMigrationPlugin.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipBand.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InkWatson.exe.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeulm.dat asena.exe File created C:\Program Files\Common Files\System\ado\en-US\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui asena.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt asena.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\FlickLearningWizard.exe.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tipresx.dll.mui asena.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.config asena.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml asena.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mshwLatin.dll.mui asena.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm asena.exe File created C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\RGNR_79532DF1.txt asena.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msaddsr.dll.mui asena.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt asena.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\msdasqlr.dll.mui asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml asena.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vamg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCCooker_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asena.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoWall.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2956 vssadmin.exe 1776 vssadmin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2692 CryptoWall.exe 2676 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1792 wmic.exe Token: SeSecurityPrivilege 1792 wmic.exe Token: SeTakeOwnershipPrivilege 1792 wmic.exe Token: SeLoadDriverPrivilege 1792 wmic.exe Token: SeSystemProfilePrivilege 1792 wmic.exe Token: SeSystemtimePrivilege 1792 wmic.exe Token: SeProfSingleProcessPrivilege 1792 wmic.exe Token: SeIncBasePriorityPrivilege 1792 wmic.exe Token: SeCreatePagefilePrivilege 1792 wmic.exe Token: SeBackupPrivilege 1792 wmic.exe Token: SeRestorePrivilege 1792 wmic.exe Token: SeShutdownPrivilege 1792 wmic.exe Token: SeDebugPrivilege 1792 wmic.exe Token: SeSystemEnvironmentPrivilege 1792 wmic.exe Token: SeRemoteShutdownPrivilege 1792 wmic.exe Token: SeUndockPrivilege 1792 wmic.exe Token: SeManageVolumePrivilege 1792 wmic.exe Token: 33 1792 wmic.exe Token: 34 1792 wmic.exe Token: 35 1792 wmic.exe Token: SeIncreaseQuotaPrivilege 1792 wmic.exe Token: SeSecurityPrivilege 1792 wmic.exe Token: SeTakeOwnershipPrivilege 1792 wmic.exe Token: SeLoadDriverPrivilege 1792 wmic.exe Token: SeSystemProfilePrivilege 1792 wmic.exe Token: SeSystemtimePrivilege 1792 wmic.exe Token: SeProfSingleProcessPrivilege 1792 wmic.exe Token: SeIncBasePriorityPrivilege 1792 wmic.exe Token: SeCreatePagefilePrivilege 1792 wmic.exe Token: SeBackupPrivilege 1792 wmic.exe Token: SeRestorePrivilege 1792 wmic.exe Token: SeShutdownPrivilege 1792 wmic.exe Token: SeDebugPrivilege 1792 wmic.exe Token: SeSystemEnvironmentPrivilege 1792 wmic.exe Token: SeRemoteShutdownPrivilege 1792 wmic.exe Token: SeUndockPrivilege 1792 wmic.exe Token: SeManageVolumePrivilege 1792 wmic.exe Token: 33 1792 wmic.exe Token: 34 1792 wmic.exe Token: 35 1792 wmic.exe Token: SeBackupPrivilege 2920 vssvc.exe Token: SeRestorePrivilege 2920 vssvc.exe Token: SeAuditPrivilege 2920 vssvc.exe Token: SeDebugPrivilege 2064 4363463463464363463463463.exe Token: SeDebugPrivilege 2152 22.exe Token: SeDebugPrivilege 2380 23.exe Token: SeDebugPrivilege 2332 21.exe Token: SeDebugPrivilege 928 19.exe Token: SeDebugPrivilege 676 15.exe Token: SeDebugPrivilege 1604 18.exe Token: SeDebugPrivilege 832 20.exe Token: SeDebugPrivilege 1256 16.exe Token: SeDebugPrivilege 1812 25.exe Token: SeDebugPrivilege 804 24.exe Token: SeDebugPrivilege 2964 17.exe Token: SeDebugPrivilege 2476 13.exe Token: SeDebugPrivilege 1996 14.exe Token: SeDebugPrivilege 2472 12.exe Token: SeDebugPrivilege 2744 10.exe Token: SeDebugPrivilege 2632 11.exe Token: SeDebugPrivilege 2960 9.exe Token: SeDebugPrivilege 2736 8.exe Token: SeDebugPrivilege 2004 7.exe Token: SeDebugPrivilege 2584 6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2064 2468 PCCooker_x64.exe 29 PID 2468 wrote to memory of 2064 2468 PCCooker_x64.exe 29 PID 2468 wrote to memory of 2064 2468 PCCooker_x64.exe 29 PID 2468 wrote to memory of 2064 2468 PCCooker_x64.exe 29 PID 2468 wrote to memory of 2096 2468 PCCooker_x64.exe 31 PID 2468 wrote to memory of 2096 2468 PCCooker_x64.exe 31 PID 2468 wrote to memory of 2096 2468 PCCooker_x64.exe 31 PID 2468 wrote to memory of 2096 2468 PCCooker_x64.exe 31 PID 2468 wrote to memory of 1092 2468 PCCooker_x64.exe 32 PID 2468 wrote to memory of 1092 2468 PCCooker_x64.exe 32 PID 2468 wrote to memory of 1092 2468 PCCooker_x64.exe 32 PID 2468 wrote to memory of 1092 2468 PCCooker_x64.exe 32 PID 2468 wrote to memory of 2740 2468 PCCooker_x64.exe 33 PID 2468 wrote to memory of 2740 2468 PCCooker_x64.exe 33 PID 2468 wrote to memory of 2740 2468 PCCooker_x64.exe 33 PID 2468 wrote to memory of 2740 2468 PCCooker_x64.exe 33 PID 2468 wrote to memory of 2692 2468 PCCooker_x64.exe 34 PID 2468 wrote to memory of 2692 2468 PCCooker_x64.exe 34 PID 2468 wrote to memory of 2692 2468 PCCooker_x64.exe 34 PID 2468 wrote to memory of 2692 2468 PCCooker_x64.exe 34 PID 1092 wrote to memory of 1792 1092 asena.exe 35 PID 1092 wrote to memory of 1792 1092 asena.exe 35 PID 1092 wrote to memory of 1792 1092 asena.exe 35 PID 1092 wrote to memory of 1792 1092 asena.exe 35 PID 1092 wrote to memory of 2956 1092 asena.exe 36 PID 1092 wrote to memory of 2956 1092 asena.exe 36 PID 1092 wrote to memory of 2956 1092 asena.exe 36 PID 1092 wrote to memory of 2956 1092 asena.exe 36 PID 2692 wrote to memory of 2676 2692 CryptoWall.exe 39 PID 2692 wrote to memory of 2676 2692 CryptoWall.exe 39 PID 2692 wrote to memory of 2676 2692 CryptoWall.exe 39 PID 2692 wrote to memory of 2676 2692 CryptoWall.exe 39 PID 2676 wrote to memory of 2880 2676 explorer.exe 44 PID 2676 wrote to memory of 2880 2676 explorer.exe 44 PID 2676 wrote to memory of 2880 2676 explorer.exe 44 PID 2676 wrote to memory of 2880 2676 explorer.exe 44 PID 2676 wrote to memory of 1776 2676 explorer.exe 45 PID 2676 wrote to memory of 1776 2676 explorer.exe 45 PID 2676 wrote to memory of 1776 2676 explorer.exe 45 PID 2676 wrote to memory of 1776 2676 explorer.exe 45 PID 2740 wrote to memory of 1812 2740 Bomb.exe 47 PID 2740 wrote to memory of 1812 2740 Bomb.exe 47 PID 2740 wrote to memory of 1812 2740 Bomb.exe 47 PID 2740 wrote to memory of 804 2740 Bomb.exe 48 PID 2740 wrote to memory of 804 2740 Bomb.exe 48 PID 2740 wrote to memory of 804 2740 Bomb.exe 48 PID 2740 wrote to memory of 2380 2740 Bomb.exe 49 PID 2740 wrote to memory of 2380 2740 Bomb.exe 49 PID 2740 wrote to memory of 2380 2740 Bomb.exe 49 PID 2740 wrote to memory of 2152 2740 Bomb.exe 50 PID 2740 wrote to memory of 2152 2740 Bomb.exe 50 PID 2740 wrote to memory of 2152 2740 Bomb.exe 50 PID 2740 wrote to memory of 2332 2740 Bomb.exe 51 PID 2740 wrote to memory of 2332 2740 Bomb.exe 51 PID 2740 wrote to memory of 2332 2740 Bomb.exe 51 PID 2740 wrote to memory of 832 2740 Bomb.exe 52 PID 2740 wrote to memory of 832 2740 Bomb.exe 52 PID 2740 wrote to memory of 832 2740 Bomb.exe 52 PID 2740 wrote to memory of 928 2740 Bomb.exe 53 PID 2740 wrote to memory of 928 2740 Bomb.exe 53 PID 2740 wrote to memory of 928 2740 Bomb.exe 53 PID 2740 wrote to memory of 1604 2740 Bomb.exe 55 PID 2740 wrote to memory of 1604 2740 Bomb.exe 55 PID 2740 wrote to memory of 1604 2740 Bomb.exe 55 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCCooker_x64.exe"C:\Users\Admin\AppData\Local\Temp\PCCooker_x64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Files\Vamg.exe"C:\Users\Admin\AppData\Local\Temp\Files\Vamg.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"3⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe4⤵PID:4696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\asena.exe"C:\Users\Admin\AppData\Local\Temp\asena.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bomb.exe"C:\Users\Admin\AppData\Local\Temp\Bomb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\25.exe"C:\Users\Admin\AppData\Local\Temp\25.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\24.exe"C:\Users\Admin\AppData\Local\Temp\24.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\23.exe"C:\Users\Admin\AppData\Local\Temp\23.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\21.exe"C:\Users\Admin\AppData\Local\Temp\21.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\20.exe"C:\Users\Admin\AppData\Local\Temp\20.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\19.exe"C:\Users\Admin\AppData\Local\Temp\19.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\18.exe"C:\Users\Admin\AppData\Local\Temp\18.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\17.exe"C:\Users\Admin\AppData\Local\Temp\17.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\16.exe"C:\Users\Admin\AppData\Local\Temp\16.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\15.exe"C:\Users\Admin\AppData\Local\Temp\15.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\14.exe"C:\Users\Admin\AppData\Local\Temp\14.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\13.exe"C:\Users\Admin\AppData\Local\Temp\13.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\9.exe"C:\Users\Admin\AppData\Local\Temp\9.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵
- Executes dropped EXE
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Executes dropped EXE
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- Executes dropped EXE
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Executes dropped EXE
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Executes dropped EXE
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\syswow64\svchost.exe-k netsvcs4⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1776
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD535c8680319cf97c6f6f0855ffcb5d138
SHA171df203af96d23307597842715fe289165d91bb5
SHA2563de2ac193105d46d5ec2c9a322a603248e822df6f3c6cc14cfc709802e1b2a79
SHA512001616f267d071fd8f3b833c3c292d7288d99de1cd12e368a5cb635989cb86745a9032e9426e96e4c78e82f6a3a9839d6bf3f3abeeacf7031223b21d57a9d49f
-
Filesize
674B
MD55fdd41d9e65dee1c9cec04fe4cd882db
SHA188c10c4ef156255e2db1ea646eccf582536c8209
SHA256c92d63fa89f93cee76e066e46ba533e038f8ef42819f3d1e36d18e5d55626a77
SHA5120b4471a9e34159fd2ebef464c48489a4d42d71bbc49754b2132749561157eff37f6583aa7a36962dbe476cdcd2a2f0faa8185b7e44fdf01e80bc4fdfbb610887
-
Filesize
548B
MD51c7ee99d882192b8f9ffa37127f1b06b
SHA1487dcec140084dcb5076a8c05820e5fa83a60f9b
SHA256b1103742365d5e0b987d81f16c0dd350b6213e674fb2cafcfab6cb6543228534
SHA5126a3899035ff50db000a12d6b85b36b187237dbb3b3041fdd478e087d834f203bbc9578a8dfae38f6a136b2a8131fcc5249feac134791f426b542437f8449a7e0
-
Filesize
548B
MD5922ac3581055c932e17eeb54378c4c35
SHA173ba879530bc27ab94fcc0c9352cc0ce58a24043
SHA2565aaf57b7bf178b0b730c7b97500f78c804ae76da8ed2e13b9ffca706db99ed4b
SHA5121b7c2bfc77f979b5b14130ef6741af1e6151af1b25be5ada11fe4243451efbd84827cb61d696e47a35c09fd51b74e3018e6e965a231064d803cf149058a43696
-
Filesize
548B
MD52c8588e72ff44e761b663c65e637a17f
SHA1f2b63017e11be4d2e2d75043876320ad11839708
SHA2568b4f322ad9e1fb36e8e56663434c581e3d5333e5f9b2f37d8d398ac792c97245
SHA51230cb09a9cbc71d7087b07415c4fc30469a5d82e8ee580f8fc4db2c67bbd8406e42ffe04975fe7fe82c92ba207c5d5e57d36dceeea09327f144010223e10c524d
-
Filesize
548B
MD55140e871915cd0dcf33d56c277ddf3c0
SHA1c76a8bd124504a992bc5fbffb0433cc3e70df585
SHA25666dd18965db049a7d901dc3239fc5822d90178fe56b488d2ee9945f3923246a1
SHA51245c807ca9cacd3e2d9582ba1613490c159c1318664815a55f30adcc592302c32f1bc7572f8c639319b9874638abc09fbb562c30f69c42266d9eeea4189c5eec2
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD5b44b69494802eccbafe089e683ecd0be
SHA180a776cef64f4ac199351caa2e1755b797d08ef8
SHA25658555bf7ab971ed2707cc397f844fd432f6272fc77f2887f6d63648e1c719856
SHA51299d8b9e14fb69be7fd7a088c4a5425f7f4b4ec4678f2fe053cc2b0da20364e853e67ff926bac6371afbdb8c71eb7c341ec66040f2b8528a68b650b655c2d71e4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize9KB
MD5602e5a4681e539c8a2784f105565dcd4
SHA1288b3e12d986a5c65c1e1a28cdabf29714a2eb2b
SHA256bf803337cc11f12610ffede69692c4b1a836816ef22ab264a96645a89d045fd3
SHA512b8b1b3f6711116ea837fccdfdf75b922f040f535ddc24368c828803307e8f2c0183b4b7ca4335733b36f8d10e455d5d20545e710d1fcd5a5c96d779f2a4c4c3e
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf
Filesize578B
MD51c6cbbad2d03c0fdd42682b4c357ebc0
SHA15fc40f644c5677842f308639eb74d6daaa17a0b6
SHA256b2dec6f3cf19de412095be084aee17384581f6e0b43d6ca4b9bdcf1cea23a531
SHA5129f37fca64729baff31ef5b92450dc173c78821f77f4138df1ff3e281c5225992730cc4f0af2ff56649cd70777dbd01e86dd71799a507e6426112d8bcd9ffe2f9
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt
Filesize11KB
MD5ab9b4f9b73a16e16e28116ddd4fa6f91
SHA1d43180bb3c1a7deeca6ff7196ada466933fb80e6
SHA256f1d1338247cc439d175071786144b30cceb2130e8874d6859926d6bd5311a7a4
SHA5121e393b27b86d25bb4190b0f9fa42b49bc69a6d2d74e13c23b1c0992bc803d54b2899db6028286d3c85a7de6066e07f82d717c7a9e5a062f313ce786f3e5a2cfb
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA
Filesize8KB
MD530b1fd9c31d95cf56110ae83b7061c24
SHA162672517a3b72578fce7d0e22659555d3de01d33
SHA2567d4eeffc486346a8f085a58473b9b784b4018ef04a035a782fbe3b5eeab134c9
SHA5121edc1771ff097d1bb61462ffc7311852e0b49cb669facaf5c10da0c4e4e1932c6595670b33df162d5096495520202fa0b147c68b338c60570cde8dbb0058597a
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA
Filesize8KB
MD5d22919ac5a94f03aea6d2381f13b1410
SHA1665c13b7e01bda39b8147b33c0b255ad450e3ee8
SHA2563abd6a182d7364875a42f8f5e0dab4152ae6a9c0507688071d35ee990de6f22b
SHA512c87aefc709cb28f0200441ddd1989946aed1dd03729a726453c4a931229b388f4245bbfb8ab3ab26accee59ed24b184f0fef61276cf2324e42eae4e88b990e16
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\MANIFEST.MF
Filesize654B
MD56e4715cf287d175e900b086c1ce21bad
SHA10290fad362112594d903f5f000c3d0e4f954488c
SHA256d95f7653ef25e3da4d2afd311c592750af0a5300190456b1e0b5deafdbb174fd
SHA5124063f54a90d3277daf25664e1924b2f75ad6e638a7d79afe22c59b2480d86f4bcefe1e8ee6eedb9ba1263b68aacbad8fda0bfe237f6f029084f0a9794ddb6063
-
Filesize
37KB
MD58ec649431556fe44554f17d09ad20dd6
SHA1b058fbcd4166a90dc0d0333010cca666883dbfb1
SHA256d1faee8dabc281e66514f9ceb757ba39a6747c83a1cf137f4b284a9b324f3dc4
SHA51278f0d0f87b4e217f12a0d66c4dfa7ad7cf4991d46fdddfaeae47474a10ce15506d79a2145a3432a149386083c067432f42f441c88922731d30cd7ebfe8748460
-
Filesize
37KB
MD5d6f9ccfaad9a2fb0089b43509b82786b
SHA13b4539ea537150e088811a22e0e186d06c5a743d
SHA2569af50adf3be17dc18ab4efafcf6c6fb6110336be4ea362a7b56b117e3fb54c73
SHA5128af1d5f67dad016e245bdda43cc53a5b7746372f90750cfcca0d31d634f2b706b632413c815334c0acfded4dd77862d368d4a69fe60c8c332bc54cece7a4c3cd
-
Filesize
37KB
MD56c734f672db60259149add7cc51d2ef0
SHA12e50c8c44b336677812b518c93faab76c572669b
SHA25624945bb9c3dcd8a9b5290e073b70534da9c22d5cd7fda455e5816483a27d9a7d
SHA5121b4f5b4d4549ed37e504e62fbcb788226cfb24db4bfb931bc52c12d2bb8ba24b19c46f2ced297ef7c054344ef50b997357e2156f206e4d5b91fdbf8878649330
-
Filesize
37KB
MD57ac9f8d002a8e0d840c376f6df687c65
SHA1a364c6827fe70bb819b8c1332de40bcfa2fa376b
SHA25666123f7c09e970be594abe74073f7708d42a54b1644722a30887b904d823e232
SHA5120dd36611821d8e9ad53deb5ff4ee16944301c3b6bb5474f6f7683086cde46d5041974ec9b1d3fb9a6c82d9940a5b8aec75d51162999e7096154ad519876051fe
-
Filesize
37KB
MD5c76ee61d62a3e5698ffccb8ff0fda04c
SHA1371b35900d1c9bfaff75bbe782280b251da92d0e
SHA256fbf7d12dd702540cbaeeecf7bddf64158432ef4011bace2a84f5b5112aefe740
SHA512a76fee1eb0d3585fa16d9618b8e76b8e144787448a2b8ff5fbd72a816cbd89b26d64db590a2a475805b14a9484fc00dbc3642d0014954ec7850795dcf2aa1ee7
-
Filesize
37KB
MD5e6c863379822593726ad5e4ade69862a
SHA14fe1522c827f8509b0cd7b16b4d8dfb09eee9572
SHA256ae43886fee752fb4a20bb66793cdd40d6f8b26b2bf8f5fbd4371e553ef6d6433
SHA51231d1ae492e78ed3746e907c72296346920f5f19783254a1d2cb8c1e3bff766de0d3db4b7b710ed72991d0f98d9f0271caefc7a90e8ec0fe406107e3415f0107e
-
Filesize
37KB
MD5c936e231c240fbf47e013423471d0b27
SHA136fabff4b2b4dfe7e092727e953795416b4cd98f
SHA256629bf48c1295616cbbb7f9f406324e0d4fcd79310f16d487dd4c849e408a4202
SHA512065793554be2c86c03351adc5a1027202b8c6faf8e460f61cc5e87bcd2fe776ee0c086877e75ad677835929711bea182c03e20e872389dfb7d641e17a1f89570
-
Filesize
37KB
MD50ab873a131ea28633cb7656fb2d5f964
SHA1e0494f57aa8193b98e514f2bc5e9dc80b9b5eff0
SHA256a83e219dd110898dfe516f44fb51106b0ae0aca9cc19181a950cd2688bbeeed2
SHA5124859758f04fe662d58dc32c9d290b1fa95f66e58aef7e27bc4b6609cc9b511aa688f6922dbf9d609bf9854b619e1645b974e366c75431c3737c3feed60426994
-
Filesize
37KB
MD5c252459c93b6240bb2b115a652426d80
SHA1d0dffc518bbd20ce56b68513b6eae9b14435ed27
SHA256b31ea30a8d68c68608554a7cb610f4af28f8c48730945e3e352b84eddef39402
SHA5120dcfcddd9f77c7d1314f56db213bd40f47a03f6df1cf9b6f3fb8ac4ff6234ca321d5e7229cf9c7cb6be62e5aa5f3aa3f2f85a1a62267db36c6eab9e154165997
-
Filesize
37KB
MD5d32bf2f67849ffb91b4c03f1fa06d205
SHA131af5fdb852089cde1a95a156bb981d359b5cd58
SHA2561123f4aea34d40911ad174f7dda51717511d4fa2ce00d2ca7f7f8e3051c1a968
SHA5121e08549dfcbcfbe2b9c98cd2b18e4ee35682e6323d6334dc2a075abb73083c30229ccd720d240bcda197709f0b90a0109fa60af9f14765da5f457a8c5fce670a
-
Filesize
37KB
MD54c1e3672aafbfd61dc7a8129dc8b36b5
SHA115af5797e541c7e609ddf3aba1aaf33717e61464
SHA2566dac4351c20e77b7a2095ece90416792b7e89578f509b15768c9775cf4fd9e81
SHA512eab1eabca0c270c78b8f80989df8b9503bdff4b6368a74ad247c67f9c2f74fa0376761e40f86d28c99b1175db64c4c0d609bedfd0d60204d71cd411c71de7c20
-
Filesize
37KB
MD5012a1710767af3ee07f61bfdcd47ca08
SHA17895a89ccae55a20322c04a0121a9ae612de24f4
SHA25612d159181d496492a057629a49fb90f3d8be194a34872d8d039d53fb44ea4c3c
SHA512e023cac97cba4426609aeaa37191b426ff1d5856638146feab837e59e3343434a2bb8890b538fdf9391e492cbefcf4afde8e29620710d6bd06b8c1ad226b5ec4
-
Filesize
37KB
MD5f18f47c259d94dcf15f3f53fc1e4473a
SHA1e4602677b694a5dd36c69b2f434bedb2a9e3206c
SHA25634546f0ecf4cd9805c0b023142f309cbb95cfcc080ed27ff43fb6483165218c1
SHA512181a5aa4eed47f21268e73d0f9d544e1ceb9717d3abf79b6086584ba7bdb7387052d7958c25ebe687bfdcd0b6cca9d8cf12630234676394f997b80c745edaa38
-
Filesize
37KB
MD5a8e9ea9debdbdf5d9cf6a0a0964c727b
SHA1aee004b0b6534e84383e847e4dd44a4ee6843751
SHA256b388a205f12a6301a358449471381761555edf1bf208c91ab02461822190cbcf
SHA5127037ffe416710c69a01ffd93772044cfb354fbf5b8fd7c5f24a3eabb4d9ddb91f4a9c386af4c2be74c7ffdbb0c93a32ff3752b6ab413261833b0ece7b7b1cb55
-
Filesize
37KB
MD5296bcd1669b77f8e70f9e13299de957e
SHA18458af00c5e9341ad8c7f2d0e914e8b924981e7e
SHA2566f05cae614ca0e4751b2aaceea95716fd37a6bf3fae81ff1c565313b30b1aba2
SHA5124e58a0f063407aed64c1cb59e4f46c20ff5b9391a02ceff9561456fef1252c1cdd0055417a57d6e946ec7b5821963c1e96eaf1dd750a95ca9136764443df93d7
-
Filesize
37KB
MD57e87c49d0b787d073bf9d687b5ec5c6f
SHA16606359f4d88213f36c35b3ec9a05df2e2e82b4e
SHA256d811283c4e4c76cb1ce3f23528e542cff4747af033318f42b9f2deb23180c4af
SHA512926d676186ec0b58b852ee0b41f171729b908a5be9ce5a791199d6d41f01569bcdc1fddd067f41bddf5cdde72b8291c4b4f65983ba318088a4d2d5d5f5cd53af
-
Filesize
37KB
MD5042dfd075ab75654c3cf54fb2d422641
SHA1d7f6ac6dc57e0ec7193beb74639fe92d8cd1ecb9
SHA256b91fb228051f1720427709ff849048bfd01388d98335e4766cd1c4808edc5136
SHA512fada24d6b3992f39119fe8e51b8da1f6a6ca42148a0c21e61255643e976fde52076093403ccbc4c7cd2f62ccb3cdedd9860f2ac253bb5082fb9fe8f31d88200d
-
Filesize
37KB
MD5476d959b461d1098259293cfa99406df
SHA1ad5091a232b53057968f059d18b7cfe22ce24aab
SHA25647f2a0b4b54b053563ba60d206f1e5bd839ab60737f535c9b5c01d64af119f90
SHA5129c5284895072d032114429482ccc9b62b073447de35de2d391f6acad53e3d133810b940efb1ed17d8bd54d24fce0af6446be850c86766406e996019fcc3a4e6e
-
Filesize
37KB
MD5a83dde1e2ace236b202a306d9270c156
SHA1a57fb5ce8d2fe6bf7bbb134c3fb7541920f6624f
SHA25620ab2e99b18b5c2aedc92d5fd2df3857ee6a1f643df04203ac6a6ded7073d5e8
SHA512f733fdad3459d290ef39a3b907083c51b71060367b778485d265123ab9ce00e3170d2246a4a2f0360434d26376292803ccd44b0a5d61c45f2efaa28d5d0994df
-
Filesize
37KB
MD5c24de797dd930dea6b66cfc9e9bb10ce
SHA137c8c251e2551fd52d9f24b44386cfa0db49185a
SHA256db99f9a2d6b25dd83e0d00d657eb326f11cc8055266e4e91c3aec119eaf8af01
SHA5120e29b6ce2bdc14bf8fb6f8324ff3e39b143ce0f3fa05d65231b4c07e241814fb335ede061b525fe25486329d335adc06f71b804dbf4bf43e17db0b7cd620a7c6
-
Filesize
37KB
MD584c958e242afd53e8c9dae148a969563
SHA1e876df73f435cdfc4015905bed7699c1a1b1a38d
SHA256079d320d3c32227ba4b9acddf60bfcdf660374cb7e55dba5ccf7beeaedd2cdef
SHA5129e6cb07909d0d77ebb5b52164b1fa40ede30f820c9773ea3a1e62fb92513d05356dfef0e7ef49bf2ad177d3141720dc1c5edceb616cef77baec9acdd4bbc5bae
-
Filesize
37KB
MD527422233e558f5f11ee07103ed9b72e3
SHA1feb7232d1b317b925e6f74748dd67574bc74cd4d
SHA2561fa6a4dc1e7d64c574cb54ae8fd71102f8c6c41f2bd9a93739d13ff6b77d41ac
SHA5122d3f424a24e720f83533ace28270b59a254f08d4193df485d1b7d3b9e6ae53db39ef43d5fc7de599355469ad934d8bcb30f68d1aaa376df11b9e3dec848a5589
-
Filesize
37KB
MD5c84f50869b8ee58ca3f1e3b531c4415d
SHA1d04c660864bc2556c4a59778736b140c193a6ab2
SHA256fa54653d9b43eb40539044faf2bdcac010fed82b223351f6dfe7b061287b07d3
SHA512bb8c98e2dadb884912ea53e97a2ea32ac212e5271f571d7aa0da601368feabee87e1be17d1a1b7738c56167f01b1788f3636aac1f7436c5b135fa9d31b229e94
-
Filesize
37KB
MD57cfe29b01fae3c9eadab91bcd2dc9868
SHA1d83496267dc0f29ce33422ef1bf3040f5fc7f957
SHA2562c3bfb9cc6c71387ba5c4c03e04af7f64bf568bdbe4331e9f094b73b06bddcff
SHA512f6111d6f8b609c1fc3b066075641dace8c34efb011176b5c79a6470cc6941a9727df4ceb2b96d1309f841432fa745348fc2fdaf587422eebd484d278efe3aeac
-
Filesize
37KB
MD528c50ddf0d8457605d55a27d81938636
SHA159c4081e8408a25726c5b2e659ff9d2333dcc693
SHA256ebda356629ac21d9a8e704edc86c815770423ae9181ebbf8ca621c8ae341cbd5
SHA5124153a095aa626b5531c21e33e2c4c14556892035a4a524a9b96354443e2909dcb41683646e6c1f70f1981ceb5e77f17f6e312436c687912784fcb960f9b050fe
-
Filesize
457KB
MD531f03a8fe7561da18d5a93fc3eb83b7d
SHA131b31af35e6eed00e98252e953e623324bd64dde
SHA2562027197f05dac506b971b3bd2708996292e6ffad661affe9a0138f52368cc84d
SHA5123ea7c13a0aa67c302943c6527856004f8d871fe146150096bc60855314f23eae6f507f8c941fd7e8c039980810929d4930fcf9c597857d195f8c93e3cc94c41d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD50880547340d1b849a7d4faaf04b6f905
SHA137fa5848977fd39df901be01c75b8f8320b46322
SHA25684449f1e874b763619271a57bfb43bd06e9c728c6c6f51317c56e9e94e619b25
SHA5129048a3d5ab7472c1daa1efe4a35d559fc069051a5eb4b8439c2ef25318b4de6a6c648a7db595e7ae76f215614333e3f06184eb18b2904aace0c723f8b9c35a91
-
Filesize
10KB
MD52a94f3960c58c6e70826495f76d00b85
SHA1e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
SHA2562fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
SHA512fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
Filesize
132KB
MD5919034c8efb9678f96b47a20fa6199f2
SHA1747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4
-
\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe
Filesize159KB
MD56f8e78dd0f22b61244bb69827e0dbdc3
SHA11884d9fd265659b6bd66d980ca8b776b40365b87
SHA256a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5
SHA5125611a83616380f55e7b42bb0eef35d65bd43ca5f96bf77f343fc9700e7dfaa7dcf4f6ecbb2349ac9df6ab77edd1051b9b0f7a532859422302549f5b81004632d
-
Filesize
39KB
MD57529e3c83618f5e3a4cc6dbf3a8534a6
SHA10f944504eebfca5466b6113853b0d83e38cf885a
SHA256ec35c76ad2c8192f09c02eca1f263b406163470ca8438d054db7adcf5bfc0597
SHA5127eef97937cc1e3afd3fca0618328a5b6ecb72123a199739f6b1b972dd90e01e07492eb26352ee00421d026c63af48973c014bdd76d95ea841eb2fefd613631cc