Analysis
-
max time kernel
87s -
max time network
313s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00387.7z
Resource
win10v2004-20241007-en
General
-
Target
RNSM00387.7z
-
Size
42.2MB
-
MD5
01268f32a4bf349d02e0d005e603b761
-
SHA1
a20b8740213729b6142af92e9711c83826b60fa1
-
SHA256
7ce5d0948155184bfe7004cd4a9aea722d60cc7e0ef959d054ce8e0eaded1d4d
-
SHA512
86b649e071887de2cdaa32e4315e42b13c2e2aeaa66f7a380104ad9c09659d237d0025baf63206e77c42efcdcef4bddae7793a2a7c7b6bdc62f6706d9aab1f6a
-
SSDEEP
786432:yeax6cznmB1icFje8X991hWeH/EmYOWViM13wjXz7b2Bs:ZanPIHLcmWcMhkbks
Malware Config
Extracted
C:\Users\Admin\Searches\6FD34B-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
azorult
http://54.37.78.107/index.php
Extracted
C:\Program Files\7-Zip\readme-warning.txt
makop
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon family
-
Avaddon payload 14 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb5-187.dat family_avaddon behavioral1/memory/1752-192-0x0000000000260000-0x0000000000733000-memory.dmp family_avaddon behavioral1/memory/1752-196-0x0000000000260000-0x0000000000733000-memory.dmp family_avaddon behavioral1/memory/1752-194-0x0000000000260000-0x0000000000733000-memory.dmp family_avaddon behavioral1/memory/1752-242-0x0000000000260000-0x0000000000733000-memory.dmp family_avaddon behavioral1/files/0x0007000000023cc7-388.dat family_avaddon behavioral1/memory/1752-408-0x0000000000260000-0x0000000000733000-memory.dmp family_avaddon behavioral1/memory/1752-5638-0x0000000000260000-0x0000000000733000-memory.dmp family_avaddon behavioral1/memory/1668-9678-0x00000000003F0000-0x00000000008C3000-memory.dmp family_avaddon behavioral1/memory/1668-9990-0x00000000003F0000-0x00000000008C3000-memory.dmp family_avaddon behavioral1/memory/1668-9995-0x00000000003F0000-0x00000000008C3000-memory.dmp family_avaddon behavioral1/memory/1668-9998-0x00000000003F0000-0x00000000008C3000-memory.dmp family_avaddon behavioral1/memory/1668-10001-0x00000000003F0000-0x00000000008C3000-memory.dmp family_avaddon behavioral1/memory/1752-10050-0x0000000000260000-0x0000000000733000-memory.dmp family_avaddon -
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Detected Netwalker Ransomware 2 IoCs
Detected unpacked Netwalker executable.
resource yara_rule behavioral1/files/0x0007000000023cb6-199.dat netwalker_ransomware behavioral1/files/0x0007000000023cc4-349.dat netwalker_ransomware -
Detecting the common Go functions and variables names used by Snatch ransomware 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023cba-273.dat family_snatch -
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Makop family
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 7136 8240 OfficeC2RClient.exe 159 -
Snatch Ransomware
Ransomware family generally distributed through RDP bruteforce attacks.
-
Snatch family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe -
pid Process 3472 wbadmin.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1960 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe -
Executes dropped EXE 9 IoCs
pid Process 3564 HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe 1712 HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe 3896 HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe 4224 HEUR-Trojan-Ransom.MSIL.Foreign.gen-f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92.exe 4432 HEUR-Trojan-Ransom.MSIL.njLime.gen-c595310365b4f9d7badcdcda2b6c681143a7da00ebc290e60528b3ccb6982b50.exe 1752 HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe 1696 HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe 376 HEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exe 1716 guard.exe -
resource yara_rule behavioral1/files/0x0007000000023cb5-187.dat themida behavioral1/memory/1752-192-0x0000000000260000-0x0000000000733000-memory.dmp themida behavioral1/memory/1752-196-0x0000000000260000-0x0000000000733000-memory.dmp themida behavioral1/memory/1752-194-0x0000000000260000-0x0000000000733000-memory.dmp themida behavioral1/memory/1752-242-0x0000000000260000-0x0000000000733000-memory.dmp themida behavioral1/memory/1752-408-0x0000000000260000-0x0000000000733000-memory.dmp themida behavioral1/memory/1752-5638-0x0000000000260000-0x0000000000733000-memory.dmp themida behavioral1/memory/1668-9678-0x00000000003F0000-0x00000000008C3000-memory.dmp themida behavioral1/memory/1668-9990-0x00000000003F0000-0x00000000008C3000-memory.dmp themida behavioral1/memory/1668-9995-0x00000000003F0000-0x00000000008C3000-memory.dmp themida behavioral1/memory/1668-9998-0x00000000003F0000-0x00000000008C3000-memory.dmp themida behavioral1/memory/1668-10001-0x00000000003F0000-0x00000000008C3000-memory.dmp themida behavioral1/memory/1752-10050-0x0000000000260000-0x0000000000733000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\creepyranware = "C:\\Users\\Admin\\Desktop\\00387\\HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe" HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\adr = "C:\\Users\\Admin\\Desktop\\00387\\HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe" rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 api.myip.com 47 api.myip.com -
resource yara_rule behavioral1/files/0x0007000000023cb7-208.dat upx behavioral1/memory/376-211-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral1/files/0x0007000000023cb8-256.dat upx behavioral1/memory/376-344-0x0000000000400000-0x00000000004F7000-memory.dmp upx behavioral1/memory/376-375-0x0000000000400000-0x00000000004F7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.Foreign.gen-f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.MSIL.njLime.gen-c595310365b4f9d7badcdcda2b6c681143a7da00ebc290e60528b3ccb6982b50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cbf-316.dat nsis_installer_1 behavioral1/files/0x0007000000023cbf-316.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 13016 vssadmin.exe 924 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 6280 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4672 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 1028 powershell.exe 1028 powershell.exe 1028 powershell.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4484 7zFM.exe 724 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeRestorePrivilege 4484 7zFM.exe Token: 35 4484 7zFM.exe Token: SeSecurityPrivilege 4484 7zFM.exe Token: SeDebugPrivilege 4672 taskmgr.exe Token: SeSystemProfilePrivilege 4672 taskmgr.exe Token: SeCreateGlobalPrivilege 4672 taskmgr.exe Token: SeDebugPrivilege 724 taskmgr.exe Token: SeSystemProfilePrivilege 724 taskmgr.exe Token: SeCreateGlobalPrivilege 724 taskmgr.exe Token: 33 4672 taskmgr.exe Token: SeIncBasePriorityPrivilege 4672 taskmgr.exe Token: SeDebugPrivilege 1028 powershell.exe Token: SeDebugPrivilege 1696 HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe Token: SeImpersonatePrivilege 1696 HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe Token: SeDebugPrivilege 1712 HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe Token: SeBackupPrivilege 2960 vssvc.exe Token: SeRestorePrivilege 2960 vssvc.exe Token: SeAuditPrivilege 2960 vssvc.exe Token: SeDebugPrivilege 3564 HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe Token: SeDebugPrivilege 4224 HEUR-Trojan-Ransom.MSIL.Foreign.gen-f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4484 7zFM.exe 4484 7zFM.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 4672 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4672 wrote to memory of 724 4672 taskmgr.exe 97 PID 4672 wrote to memory of 724 4672 taskmgr.exe 97 PID 1028 wrote to memory of 1860 1028 powershell.exe 102 PID 1028 wrote to memory of 1860 1028 powershell.exe 102 PID 1860 wrote to memory of 3564 1860 cmd.exe 104 PID 1860 wrote to memory of 3564 1860 cmd.exe 104 PID 1860 wrote to memory of 3564 1860 cmd.exe 104 PID 1860 wrote to memory of 1712 1860 cmd.exe 105 PID 1860 wrote to memory of 1712 1860 cmd.exe 105 PID 1860 wrote to memory of 3896 1860 cmd.exe 106 PID 1860 wrote to memory of 3896 1860 cmd.exe 106 PID 1860 wrote to memory of 3896 1860 cmd.exe 106 PID 1860 wrote to memory of 4224 1860 cmd.exe 107 PID 1860 wrote to memory of 4224 1860 cmd.exe 107 PID 1860 wrote to memory of 4224 1860 cmd.exe 107 PID 1860 wrote to memory of 4432 1860 cmd.exe 108 PID 1860 wrote to memory of 4432 1860 cmd.exe 108 PID 1860 wrote to memory of 4432 1860 cmd.exe 108 PID 1860 wrote to memory of 1752 1860 cmd.exe 109 PID 1860 wrote to memory of 1752 1860 cmd.exe 109 PID 1860 wrote to memory of 1752 1860 cmd.exe 109 PID 1860 wrote to memory of 1696 1860 cmd.exe 110 PID 1860 wrote to memory of 1696 1860 cmd.exe 110 PID 1860 wrote to memory of 1696 1860 cmd.exe 110 PID 1696 wrote to memory of 924 1696 HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe 111 PID 1696 wrote to memory of 924 1696 HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe 111 PID 3896 wrote to memory of 4260 3896 HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe 113 PID 3896 wrote to memory of 4260 3896 HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe 113 PID 3896 wrote to memory of 4260 3896 HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe 113 PID 1712 wrote to memory of 4232 1712 HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe 114 PID 1712 wrote to memory of 4232 1712 HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe 114 PID 1860 wrote to memory of 376 1860 cmd.exe 115 PID 1860 wrote to memory of 376 1860 cmd.exe 115 PID 1860 wrote to memory of 376 1860 cmd.exe 115 PID 1712 wrote to memory of 1716 1712 HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe 120 PID 1712 wrote to memory of 1716 1712 HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe 120 PID 376 wrote to memory of 4692 376 HEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exe 122 PID 376 wrote to memory of 4692 376 HEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exe 122 PID 376 wrote to memory of 4692 376 HEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exe 122 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1576 attrib.exe 1156 attrib.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00387.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4484
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exeHEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exeHEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C NetSh Advfirewall set allprofiles state off4⤵PID:4232
-
C:\Windows\system32\netsh.exeNetSh Advfirewall set allprofiles state off5⤵
- Modifies Windows Firewall
PID:1960
-
-
-
C:\Users\Admin\AppData\Roaming\guard.exe"C:\Users\Admin\AppData\Roaming\guard.exe"4⤵
- Executes dropped EXE
PID:1716
-
-
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" javascript:"\..\mshtml,RunHTMLApplication ";document.write();shell=new%20ActiveXObject("wscript.shell");shell.regwrite("HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\adr","C:\\Users\\Admin\\Desktop\\00387\\HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe");4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4260
-
-
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Foreign.gen-f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92.exeHEUR-Trojan-Ransom.MSIL.Foreign.gen-f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.njLime.gen-c595310365b4f9d7badcdcda2b6c681143a7da00ebc290e60528b3ccb6982b50.exeHEUR-Trojan-Ransom.MSIL.njLime.gen-c595310365b4f9d7badcdcda2b6c681143a7da00ebc290e60528b3ccb6982b50.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exeHEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe3⤵
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:1752 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive4⤵PID:3552
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive4⤵PID:4140
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive4⤵PID:412
-
-
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exeHEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:924
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\6FD34B-Readme.txt"4⤵PID:6008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\638E.tmp.bat"4⤵PID:12012
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 16965⤵
- Kills process with taskkill
PID:6280
-
-
-
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exeHEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vol C:4⤵PID:4692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c vol C:4⤵PID:3812
-
-
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Blocker.lckf-6e10a2668f758a105e33b8cc649173fcadc5c7f5a58f7e88e9512224a4fa9a6c.exeTrojan-Ransom.Win32.Blocker.lckf-6e10a2668f758a105e33b8cc649173fcadc5c7f5a58f7e88e9512224a4fa9a6c.exe3⤵PID:6276
-
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Blocker.mobj-fa2305975aded0fd0601fdab3013f8877969cb873fb9620b4d65ac6ff3b25522.exeTrojan-Ransom.Win32.Blocker.mobj-fa2305975aded0fd0601fdab3013f8877969cb873fb9620b4d65ac6ff3b25522.exe3⤵PID:9452
-
C:\Users\Admin\AppData\Roaming\easymule.exe"C:\Users\Admin\AppData\Roaming\easymule.exe"4⤵PID:11648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\240836328.bat" "C:\Users\Admin\AppData\Roaming\easymule.exe""5⤵PID:1824
-
C:\Windows \System32\wusa.exe"C:\Windows \System32\wusa.exe"6⤵PID:11812
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h"C:\Users\Admin\AppData\Roaming\easymule.exe"6⤵
- Views/modifies file attributes
PID:1156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\240838578.bat" "C:\Users\Admin\AppData\Roaming\easymule.exe""5⤵PID:6556
-
C:\Windows\system32\attrib.exeattrib -r -s -h"C:\Users\Admin\AppData\Roaming\easymule.exe"6⤵
- Views/modifies file attributes
PID:1576
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\0514.doc" /o ""4⤵PID:8240
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exeOfficeC2RClient.exe /error PID=8240 ProcessName="Microsoft Word" UIType=3 ErrorSource=0x8b10082a ErrorCode=0x80004005 ShowUI=15⤵
- Process spawned unexpected child process
PID:7136
-
-
-
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Makop.af-e51abdb2023b560244802f7d9687944dc0dff3042c28d7bc7a2b517df6e24942.exeTrojan-Ransom.Win32.Makop.af-e51abdb2023b560244802f7d9687944dc0dff3042c28d7bc7a2b517df6e24942.exe3⤵PID:11828
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Makop.af-e51abdb2023b560244802f7d9687944dc0dff3042c28d7bc7a2b517df6e24942.exe"C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Makop.af-e51abdb2023b560244802f7d9687944dc0dff3042c28d7bc7a2b517df6e24942.exe" n118284⤵PID:7944
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:8268
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:13016
-
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet5⤵
- Deletes backup catalog
PID:3472
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:12632
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe1⤵PID:1668
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k Net1Service1⤵PID:10040
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:11412
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:9712
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:6068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
3File Deletion
3Modify Registry
3Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5696f53e0fbec0e1dc31b51175774ba50
SHA1d468ef503187decb362554a912195f3e2870d823
SHA256226d66a6f7c984ae429fa3cd8f8ce3eb873d3f0178bfc771b60af4a254f914f5
SHA51290d1fb3412870d544f3a89a9b4a8fc2c79acfbb2fdb8bd7e1fe7cf54db04ff29954b37db8c5ae58b2b87865c316c0890ca1750d13e9257c92b4a8d1576fc475f
-
C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml
Filesize3.3MB
MD537a715dfe0898cd3032d373ef6a7305c
SHA160a4276907e887da9559d8e3a164adec15be6d3e
SHA2565cd31b4051e8f3d0656abfb538026611a6ffc8ccf73b17aa23735b70de57f017
SHA5120532febc5e8afb5aa694bf25ffb0ce4b7fd5a269d00ec721fa69a5529a4cb8af5fd31556728a2d891b4e1bcc9abee558e48312a87fa4172346ab3f8aeecfd027
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\SystemIndex.1.Crwl.6fd34b
Filesize1KB
MD513f8e1f3df1bb11501d96759096a824f
SHA1a843662a840edfaed85b89857091d0555067230c
SHA256e88d4eeabce750cb4b7e9e29aea6aa81dc673e3a2ae1f813c9d37e66b66e3492
SHA5128c1922252cb9e5b8b787a41d6f9531cb42fab3ed2ca6541a591715f50fe94b937d967b2178326c6d4771d80644264702968e873e41860c57292f42e5501b7557
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMap\CiPT0000.000.6fd34b
Filesize506B
MD5737f35f720f8ebad752591399b5982df
SHA1d8735b78742df73f3e5a52d26588abff720a4a77
SHA2562a5d9738daa4a5df3656134ec0b41972a329b83db726d7aef6fb4fb2fde081c8
SHA512fde8c59b9301f366f0d75b996bbfb6d201e55e7c8cb5d9682f7933a6bff22767844c400766db10271ed09fb68e6c46e014cb29897c7a9b951d12e3f0baeb91c6
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\02305155-8ac1-1189-ff55-b7119a53887c.xml.6fd34b
Filesize3KB
MD59252f5bf4877f6421b2e55a086936064
SHA1e2fdd04d0762a111f349889a15d15a9514d90ca4
SHA2561ff196e63005bbb3e9561c93880543df46e379bd120f64a438e5bc98a96bcaea
SHA512304a69fa22d1dbfdb0d83e2ad6d9b5a4d6ff0c5181cc70b91ed820b1b8cb1f6629510d48bd67e673d2dc7d14ef67abd1c668023d4a7ad352d9acaa473852f048
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\03f8974b-362e-33e3-2e0b-c7bc2ea01c63.xml.6fd34b
Filesize3KB
MD5a11f8bfb9956307f372d3b6a75710014
SHA11bb23be4201b33214ef6252ca7e7afe7b07a56cc
SHA256b8fa81490c932a9d869ca9571143196d3ff756585491a48e9afa03f03b8fb7fb
SHA5120abb2ac83e5e34a51c7edb4f72b6cb1752a5fc32a4d747c15a14731879af76d7f055639ed2f3b618f2ff0e26b789f0059b35da272376f0f4e5d80afbedd27f69
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\0890ad2f-b74f-c384-f684-9c33f8f67924.xml.6fd34b
Filesize3KB
MD5d20a301e75f1635b8edb43ab2a8a2d02
SHA1cf6dc0be275ce668eb50c9e12134e1360067d984
SHA256664a85c879b889e31d48a272b552c09ade7bab141e2e20dd3b3fa588e728f40a
SHA5127b84be4ea6e39de89b3da3ce628664ffb5490edb0744842966f43af8f1638bfdef4bfcca2bfcf37d983fbf9b5fe06c6625d2f66efcda59f11fe09b0f85c64da8
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\09ec127d-8158-a906-c12f-44a86e3e994f.xml.6fd34b
Filesize3KB
MD508178fcdcac87f20df84039eed10db2e
SHA1da7bb8fb41333d004c124e48f1ff0f60c00edea5
SHA2565c5940f2d8fcbe374f937edc0cfbc9e5ee169bac9b0c074631e47198d54c09ac
SHA5120164bde72ee6c2a4e80335689fee01447463b479f09408caab6528152b8aabfb222217749f2b53d60877da05f4f2d02e80315031fe303f9ed689b34864187984
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\0a8c1492-65ca-6a01-de25-0e183559d10d.xml.6fd34b
Filesize2KB
MD5d5fe0c519dde4a21ffcd773bc3993043
SHA1f1345ec4ee909754d5ed461657c363ff66d9f9bf
SHA25642e1d7f0477b79248457b072347d104daea96678700983a1da7cc42a71c13192
SHA512630dd82d5e22c040cd0deb55a794ed659ed1756864d0e015cb1165ab65011f58dea51bc3dfa44e3670925eec42c750e8f2aabe428e9f0d4e84043c865d3cfbec
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\0f8e2cd5-b8eb-7a22-b9e9-9b1183fa0a84.xml.6fd34b
Filesize2KB
MD59653da0cc2f92dc8abd0653e44c38590
SHA12cf4f4c5e23bffc9ba1082f1dfe355c7d572fbc8
SHA256d886c050952ffee61983269492ea5e59ac0af5270571382515f2c9d02cba5907
SHA512ea7a008e1d79ff70fc2f17aaa11a4b9ecf6e4ff95349d0633a6bc5d2f79cc7ad34ef846a90a786640d10d23e6583bcbfda0bd3a220f337b8394685adae4966f2
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\13ba8772-845b-29a1-ae9e-fb2793ccf4ea.xml.6fd34b
Filesize3KB
MD527e73b9eb2cd03b25efaeb3521f86994
SHA1bac9e46618e59c5605382734d4127937b4f96c41
SHA2560132271b8ede70d5ba38798b9e8a6e1a4e2867728b39151c0a21dd4f1571ea9d
SHA51283ed12cec65c4fc10b9935a372b9c033ace339809f2256604c519f816ce87b0bf815faa26c7e4ff88eff259c201b7dcbe83ba7ee50a43c79c9c7d67c09ada980
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\18549a9c-bedc-b855-f0e6-0787d8b3300d.xml.6fd34b
Filesize2KB
MD571e7bf04b9de3768cb5d5c204c80b64b
SHA1a9bf1b434c644c0d9072483f9c45644867bed881
SHA2566f63371ecf9266245dae8b209a9790dd457763c50b86012dd871b552cce5f6da
SHA512dfba59f355dfd2c8f04118a1638cc60fdfac373269f79c1326a90da4d15a9ac9758159bb2bb51623afd736b333ced85117a1ea7b0bbdac66f8fbdeef3ed857cf
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\1e225998-faa0-5fd4-4db7-5e7686ee3b47.xml.6fd34b
Filesize2KB
MD5a4cfb6c013a2e942c9b5582cd8542ba8
SHA15397a892843d8d3654d80dc99d6a2007d1dc55dc
SHA256f60e34d584fe520ca0fb3a8bc98eb752b7cf550026f7466d98f0db4d75981a22
SHA5120423d276d833c33e5104258ff425b0c10ce4bbc1fc5cecf99222da3bc19d35cbffd9c3254403a7a07ee6395bb059e541d5cdc38718b73c2e30b45b0b63b47463
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\1faf63f7-f387-4522-1175-68c9652d968a.xml.6fd34b
Filesize2KB
MD5ead32fc4b7ec997b9176eca2ae94384b
SHA18bffb40fb6d517b64397fe4f5d33c334e2104911
SHA256d70bab39ff6e65406c58f45200b67abee1f929b3dd0e5cb0d78b083cf8863645
SHA5125269bb03b6d108d41712e31d6d6a9ed351c1e7bf73facaadf83e78362dbdd67df3262e159358a8cc835df15f269768bd468016a494b3df9bc728af828dbb54db
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\215f9712-9fca-a3f8-5b11-660eefc73b96.xml.6fd34b
Filesize3KB
MD58639d5ef4862c6ae3ef8a27bbc061e90
SHA1c9c21bf72a574993787dcb6c640486ae888697af
SHA256ad948afad95ca7e3bbe575cb0fe89587fe01ce2e060c9c6df17a17f7fb9ba3ac
SHA512c44f1aad97c248006190c29da7afbfaf952be942f13a8a122ab5bcb2a9b54a721fcc46aecbe9810b4bd2e1af06b3fca246577ac706da40c146945176860ba2ed
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\2657f7c0-8294-58c3-f394-15fe18ba174a.xml.6fd34b
Filesize3KB
MD5dbf359c3fa3fa16aac679edb1a78c6da
SHA1c4e0bc324ca885d7ad3acc0e25a0fd333633b373
SHA25678dda332fd79ce594533b32383c53638f6e641e2cc9f0344392f3a4afb3ec02b
SHA512c7cd65bb9436dbf244024ab86af2a6933df7bc7442e96584e7f0961d2ce8f901629afde0f14b439066b9aaeaafa2ab8ec773ed642ca62e5ae25505b31461c360
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\26943e1f-42ed-f190-2895-3bc2b8c4176d.xml.6fd34b
Filesize3KB
MD564472de2ce52d1b93ec71f8bc9016743
SHA13c343c43d46f325440b87f7aa3bd4e1ffed73a61
SHA256eed44c306cd352c9b932c3d9c9e0aee57cf68561f980bb12648590a14ec575ee
SHA51228ddd4469d0dfa75711182db7d055e12d409318043882e3443bdab32b2ac0f950ebf4456505e4e58e65f083186ff3df1fc98762c9b9c8273bcfab0ed07603a90
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\28502d06-9d29-8514-1e5d-64447116d798.xml.6fd34b
Filesize2KB
MD5f5e582409acc061b93273f8f32499321
SHA1136478a2ffc6cf754031d9702457f89f6d4fc91e
SHA256a171507e5a26ed632139d576201c6fc925ccc169fc02b34516ce412bc7c404b5
SHA51289776b67b804d39baaa59a793447099e876b14218c1bacdb142229b4a9d0be8005ef244f8a2e4694d2ef42718d67112f736490c6229369e185df5b1e9b40e4a3
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\28748306-9f02-a5d7-6ded-4459fddadc31.xml.6fd34b
Filesize2KB
MD5099d4724a999d0c037931db143a11bb5
SHA13310166fe0ba0b4a13f77bf0f4e0a888318d2dcc
SHA2562c0b8adca52704c33ead8fb21b2c0c237ec96ed523766b6baff6ea265c689505
SHA51239f6ae833ca5db509ec65aebb14482fbeb514325ebf9a28649749fe43b6179dfd62fb261deb05f76975b1f8dd957ee3cf12b2c7895dbdc881d1751f2d04f6507
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\2b5d0f60-d93b-1629-f3e5-4167231c7ee6.xml.6fd34b
Filesize2KB
MD5746b7d928f2f829f1310985a65407e24
SHA164fe74271802f61292737c1471a26850b7adb69e
SHA2563b89739145cacb1990c78cc1f0ff5f04ac583b53516137c7463e46184ede744a
SHA512a1d7ce76c402c0bb4b002194183caa66b125fc59f9a3aa11884a774ee332a86c8362fa87e9cf9c00824894a44e5084c4f6a2c253c0662e1ad94816b66e7b0b1f
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\2c47903d-15ab-20db-6020-db5206c59481.xml.6fd34b
Filesize3KB
MD53917905d8ebd0103e0a3e098051120e4
SHA18427e872cd782b5b46f5d1162d9e411b90d8794b
SHA2560d7be1c9f216af361b42d0879145e859079eeb96fd29ea0853f7789e482538d1
SHA512f47b9a00e2c6c5fb1bf04d5bb3f546fba5cdf114ba5e4346ae7d2e0012c9005aff62d0c97ebb6e2e9addddddebf6497905f0f011f5e784e9df4fa53c9fb48745
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\2c6fb1ca-7f49-06d3-3080-e7811bdac4b5.xml.6fd34b
Filesize3KB
MD57d3b63b77f7c2a099bd038ca1e56672e
SHA1ca1208abe8a76b148699c5a0345ab3fd33e3064d
SHA256e015fc46c60d722c323703740aabb3d7ff95eb533554fb3940b3460f6aaf5460
SHA5121a54828b02cb2a607e1e6684542acb6ac62ceab2bea6aeb279110354b4d04a2dd16855e18c4f6833db200f815d8c052fa4afd746d7698288c84f34eb9b604c45
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\2e267d1c-9ef4-8ee3-57be-e11f61eb9d03.xml.6fd34b
Filesize3KB
MD5c40d5c435bda85f404c7acd5f904ec8f
SHA132564db026e2f118230aefd94f2e8ca8d47ffdbe
SHA256e06f4dac1247f6f3165bf5ff89e77c757a0ad3dd677d902d02a46dd8ed7909fd
SHA5128ccae39553d91be2647c32b2fba6b51ed5113d0a8d5827e0e5cdead1edfd1df0cde7c63aa8858382ee8406ddfc2b78356b390801fba24bc51a6c220021aed535
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\306e67c8-9a1d-38de-8654-054bd8a6e6d6.xml.6fd34b
Filesize3KB
MD51d151986c15c2b2b26caa0f8cafa0ce4
SHA1c5efc014971b7b4b298ff4e678f862e4b81cad01
SHA256f4a5580593e6308c088f8213d47a78431a259932caedeabd26195a4bae989ed2
SHA51266903990955b0b50a145e75236ec47609510447b44b75e03d2e60109701ebc1245e824bb3fb0fd75d0eae44c7ea562d143e6d7d925916d4a8f844e7f1bb840c3
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\3110b8d7-d60c-6adc-c3ce-bd22f748af91.xml.6fd34b
Filesize3KB
MD538eb013735c689b74b0bae17b9472866
SHA1b4ef08c29ebc9b146308522c9051bbdaa4a50c40
SHA256ff62d6fdefe703980fdf177a7b7ad2599e7e8cf74292c452a33e27bfb665caf6
SHA5128c6170c399eafc78c2f482615a17baa411e8389b400f01d07a191123f9b42bfb93383046af9f00a193dbb2908bf0050d1fbfae5bc1733bf7d8127b5c3c6a9be7
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\3c8c7eb3-7a1d-7981-0472-571cdd1d1292.xml.6fd34b
Filesize3KB
MD551ca275c3ec4a9efe430ca3c363a4cbc
SHA1e8e02ebe6cc8bc6e418fbbb7086101d94498eff7
SHA256f3fa21fcbf7b5936f942a26efd56e12606ef9e053572673079610d17b45f8671
SHA51215c719f0026446075cf2e4f763ca6d7f4256e8f708c4f7272cf417a94cc4fd70c3373fc808548a3e6d664abf05cd4cb5603c9be4476cf5a72a710a7ad3037b39
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\3ebdb897-991b-934f-ee13-2ca21ed81938.xml.6fd34b
Filesize3KB
MD56e6de3642c8e33d019fe9b3ac1b0c37f
SHA150ec6278d6e6cff5a0897f1fee137952ff817d79
SHA256f6b0894a6fd8586b44e58ac8422d6a2f8d5599a493edc702fda0442722125bf0
SHA512a47241aaaa19ac024b48a61bb92514b26bb061339f7355dadd56b940d41d7e874133d28c7c50e0b77e4d5b73df5e117624bdc2fce60e8609ab26f4f097d1c9fa
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\8ce3d3dd-a4c7-6c38-5fde-1f9f5df98807.xml.6fd34b
Filesize3KB
MD5be958279aa7ba26829f34a13d04ffe2a
SHA1afed296b25d19ee35c8c9488a3373cc7d3803b50
SHA2561429d2f96e9d6b2d7d7f06e2b77835be613c132123a779bf1e93b53d8075af61
SHA51254efa218a3545350675b111449e8245e7ae0045cf76b0548baf3bf41c50e4d124f17232a7096568da0081a23c7cfe629571abd2015bf68ce071e52a808bba413
-
Filesize
5KB
MD572775d5c0cc078103f127bdac4a03e1a
SHA1871c78ac1a2d8b3b6edfff203e8c24476357129a
SHA25604c64ba032b12031c8ee394b56c21c3cefe20b62aeef74409166859008f9aa61
SHA512df62b6ddf35e79a63ca1c3c5b9d991c5050a39c6d50fbb156faf8871b90d35248a94a14455868da2ca505aff2af52925a5e4762deadc8c69759107eb6bea3e8c
-
Filesize
443B
MD574d74f046ff54c74ecaead9781e8884f
SHA15f7c5c137650ea0f9bf6a6b9258418f046119118
SHA25607a85cdfb57569149bfe9f52ec5adbe0fd06e8be7ada023c4c10749a68512762
SHA512a9112fcaf706dff6b87d3585f216c2734f76fadc9bb8e958a7f04653ae7001eb5dc88cbee653bac1e69db50d17ead88274fc324dcf321b3193028d4f0d41c2a5
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
29KB
MD568875f4b80fd1350af7dbea4d05a811b
SHA11e0a63331814aab39ffb7806289a8ef3433553c3
SHA2560a0ce7fb610e3c037beb2c331e147c8750ba9f7ea2ece2f91f27f1a83c6839e4
SHA5124720b8e81dc749c63bb906e77e873a5b566122937ca54c41056481c1be98ba7d723e2b0d09e02dd12032f0482290731fb61b594293f33d88e458d4b9009cad28
-
Filesize
16KB
MD51fe521f0ad24145704e6085b4a4859a9
SHA13fa2f11e142f5f07f2dd63d89b58d01e9397ded0
SHA256898741e11fbbe6b5534fb12a489add1aaa379ee6757c0bd8d6c631473d5c66f7
SHA5124ed6140662b588d7486c2825c385d490be92599bd6817347ea43b4e72a82f8bcc00bc3abf8c235c94730f1d4bc21787c2756eedb63c4302d8bbe1a3128b57a3c
-
Filesize
13KB
MD5bcf68fc7b257c2d255dc2d398884d0cd
SHA1970df639d3d4b32123e461b66fd3b46d033270bc
SHA2567a29cd4e548323a74f28854ce4115dabb874334025abac084fed50f7902d54b3
SHA5124154abdef70430ce47301870963fa9926a76797b9a68952e0ca0fdc72565a674b31c468c37ee2dd76f1b46e5876c7bb0a1bef794186b0250c907af86ea90904c
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Agent.gen-7980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf.exe
Filesize955KB
MD5b226803ac5a68cd86ecb7c0c6c4e9d00
SHA1110301b5f4eced3c0d6712f023d3e0212515bf99
SHA2567980ef30b9bed26a9823d3dd5746cdefe5d01de2b2eb2c5e17dbfd1fd52f62bf
SHA5127a333fb668c8a7fa67715703d16cf8ed296c553fa3aab7c861337a211c605d0b20f0c760a4bfb3b72561efe342472382ecf890fd5de3e51c0022038474516e79
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Cryptor.gen-1e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7.exe
Filesize71KB
MD54ee61d7f7480583c3552296597b1f160
SHA113aee3c6a19022d0fbd0c5f3d768f4db848a10d4
SHA2561e751530eccc5c6424c1e5611d2b17b2fe3e8879ef01395aa9809ef6472b58d7
SHA512912b18191d10383c1f3a4540b7b05f90eed451deaa01237b36f073a2cbb7b104731b8eb19d322ad3f05ea34f951dfdb531787de1b14bbd8e301d3676ba661c47
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Encoder.gen-7755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e.exe
Filesize235KB
MD5fa476b25c7396673847ba473f8704ea2
SHA1c2af63057d8300d76eb55cef9645363970b23288
SHA2567755ce4a2a9cfee44fedcd9149c5ae45bb7aa7b019cbeae7a107641c12d5d58e
SHA512e510f0d826f6f36622a772f460c8882f5ed226dc903667c84e1501a7d401b3e80ec9b8cf6c231ba2aae269095d6fe7ece90d79170b4b27ad17b892f24937c004
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.Foreign.gen-f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92.exe
Filesize1.6MB
MD5eddd811e7f2369a47c664e1a284cf8bd
SHA1862b8a7b780760c9cf94687e18a7bdfe860d9765
SHA256f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92
SHA512733dc8b284cdf9515ab3e26a4b13cdecc8e615a7d2288f102083ea2554347178d01f6e219643ed5f2ab0712d4e73832ec4c0b4d57f4de1b3ce140d393355cf11
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.MSIL.njLime.gen-c595310365b4f9d7badcdcda2b6c681143a7da00ebc290e60528b3ccb6982b50.exe
Filesize289KB
MD50ec296b407fc590bf74b96c5f2e2dccc
SHA12eac8b05cd342b825fed9818dad076c714aa7a15
SHA256c595310365b4f9d7badcdcda2b6c681143a7da00ebc290e60528b3ccb6982b50
SHA512228d517ae1a149005b7699771e52231d80a2e4250590a93976d7d1aaec9721d9df20e72881c39b9f693799c77f85fd8ddbeae674ed3ca9cb94cdf61b6675e107
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Avaddon.vho-6ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629.exe
Filesize4.8MB
MD598208f7fc593255491f1824c24315934
SHA15151cf986819bf0546630ee84447b430c6b4c587
SHA2566ad2831339a2a6fc8d140c8718cf38fabef9915409bd32cd86221b515b4be629
SHA5126709fa75b845249683c07738c9eabd0df08b872bd406da3be33feab4b4f5139c42f400b0f326c98522c9dee9b991aab0fc21f9f5ca4215436232b79a18248639
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Crypmod.gen-6bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc.exe
Filesize69KB
MD53f3cc36f4298c4db8e77794eb96db81a
SHA12861da47ebc33a57aa93e483b1ea946a5b33b345
SHA2566bd34d33ccb47430751ae964ca56ec206da0fa3bdc5eb670fc54edf4c11629bc
SHA5128cab92e54aeda3be69ae0bbdd47e15be43e57176fcaafd92afa2a2f68afb0099caf65bcb38359395f6f84616af07f928e7aa2fb576e7ee0130f42a1fdb00d505
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.DMR.vho-2e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685.exe
Filesize394KB
MD5c8344f94f045530670c317ff1f9c23bd
SHA1e14898868e870e8c2559931b345d7605b1d4530d
SHA2562e75096b3364e2e9fef81fac5626e1fb15d9e5f76afe308cf7d4053040f65685
SHA51244f1ec665c61649855d18d6d8003bb5fb75ecae3566423de73a7227ace478620cb028690f9eb32a757c608be812863c6afc970d56b85c4a17193af265e7d692b
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Encoder.gen-c0e0d11a66b1a521d07699e2c57919267b8a86c8f8611768c08777a2bcd804bd.exe
Filesize267KB
MD5cfa9f34956dfa2842ad1412490e4eb16
SHA19d0f9de83912e7b6a55ed9a9d4d5b066577a1916
SHA256c0e0d11a66b1a521d07699e2c57919267b8a86c8f8611768c08777a2bcd804bd
SHA51228cbb7b7866285608d6f3366799e5a7821b33774f393dbe22ddac9eb1238c2e1c6ba3e7b0076f3e79dc9eddc7f7ec0c60e2dba9ae0f2ed741178f4b7b18ab80f
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.GandCrypt.gen-08ef36cec235b20cd791cfa4c8a49af3060d0f480c6fa6b0d91bd420b9b6f597.exe
Filesize250KB
MD5a9ec4d395a123c8ca0912d4be3684d83
SHA10b47bb85de7ad2a19cbd5858b8df6415c46cdf48
SHA25608ef36cec235b20cd791cfa4c8a49af3060d0f480c6fa6b0d91bd420b9b6f597
SHA512c3b25cfb554c8a6e68f0ffcf06b4b4e2a2d635f7888ef0db42de2cbe809b350b5bd58d965fc7bbd765d5f9bf33dd7316b3c9c51e2fab4f76c05d3208adc4f56e
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Gen.vho-bd5ebf9632ad17e9a39393ab94ef055307ec053486fe703e2a614de391bc4a65.exe
Filesize4.6MB
MD5483b85e49e1b8c04b0e5414d7db80208
SHA1af430762aea6c3769d0ebedfd553cf22e0f223ac
SHA256bd5ebf9632ad17e9a39393ab94ef055307ec053486fe703e2a614de391bc4a65
SHA5123d9b5c2b2c045e0c0d50e053492c18677bfaf958e92a709ec89516624d0b308b8509c308a13626e18acf535dfd648260046000cedca2b00f303e874755145a66
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Generic-b6e3cdf6757bb325e62cd43f31eb590e8ec63f25674b89ff65d70707af999951.exe
Filesize2.7MB
MD5337cdd6d89e93362c8223fb8810dec2c
SHA19558ea613144c8b50a24153411823e8b39c03e03
SHA256b6e3cdf6757bb325e62cd43f31eb590e8ec63f25674b89ff65d70707af999951
SHA512a4fd21e5c4164c2a7cb003128a9c1f264886e2941ccb3c4bde302d329b38c8bd91f89b868f03c7d0663e21bb827b4b5c032698ea92678a7c50917fd1d641d992
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Limbozar.vho-581122114ad28f404b2cc4f8df5d77b6ed447f8f26f862960bb0181776bfacd9.exe
Filesize998KB
MD5e04f822169925eef47a96bbd38c349fa
SHA16e3f2634997b59e327c039ad426035e74686687e
SHA256581122114ad28f404b2cc4f8df5d77b6ed447f8f26f862960bb0181776bfacd9
SHA51245a8b8b39ecf6fad1bcfbd7a58614975f62d0a4f2b9eea54ea5d9b15659e9d89b2edd27bb9e8f49697736a3b1ea15b56833aecee10e56735aafe1be3650f82fa
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Makop.gen-fb9f6b2171efc6573097847509a882ad8c4c19104d85b13fbedf625d3de8f69a.exe
Filesize1.2MB
MD5a64dc9366857c5bd086ed1e368ba861c
SHA1aead4b1ed4ed46c0c3ddfc6fe887ed9f2724a318
SHA256fb9f6b2171efc6573097847509a882ad8c4c19104d85b13fbedf625d3de8f69a
SHA512a0e6781350365bd9b352de6ba40cb3236402954722086e487835dc4773c311fa2df6b2e7d1064083b51d5c6520587c6df51cfa9c9ff1f8c6571b1871c893bf31
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.MyxaH.gen-dbe7a4140fd10b17154c74ca5adfa07f0c30f7f399785c10f5a3b3d2643e8af3.exe
Filesize285KB
MD56596ff96b32745bf4cd96a8c68dace6f
SHA17a6373248d1ebec08aaff8363ef76890da0dedba
SHA256dbe7a4140fd10b17154c74ca5adfa07f0c30f7f399785c10f5a3b3d2643e8af3
SHA512506a5e6a816ee2b4c34c8b09db033113b10c2d2450a7b72aafc4967f6bb7ea6778fed61997dbd42bf498fd59e9e74b914c3dbf32073061d48cc60efdb1a71bd4
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Rack.gen-ba8a54a8e59228600a0b9d8ae82b37ec43ee76bae638590d7f4b789914541c41.exe
Filesize236KB
MD5a72742161504a95a3fa60e9483161695
SHA1b5dd272fd90d9d4a2944df609d3de73b484824dd
SHA256ba8a54a8e59228600a0b9d8ae82b37ec43ee76bae638590d7f4b789914541c41
SHA512e501834e5f1450187cf10ba8f2e99f9b77c12141dc9d9cd943f11a108477cb315f5cc6f67b125abb44c3e3479c825f85b2bc4b133765412bfc4d432565502200
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Rack.vho-df0246edf869fb0249ff3c0bf24dfa4469de6ef42da77ae89fcb98d3a7022c7f.exe
Filesize191KB
MD5cc9f35167c4408b80d9ec3535475e6b1
SHA179449ddcc0de3e317ae549e4c2c3ea1536f6c4dd
SHA256df0246edf869fb0249ff3c0bf24dfa4469de6ef42da77ae89fcb98d3a7022c7f
SHA5123907546353dc0cf3c1b0f53017512d5649bf3c3294765b59c8292e75810e58dee9f0aeaaac9ce4487fb0a28e7d04c3ef135f470cde17eb12e445fa9eec1e924f
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.SageCrypt.vho-19a05417793c14ee11b2ca7c32f96cbf70f15cae8b26aec7c2e3fc3c0a0f94e7.exe
Filesize406KB
MD583f8fc6500e3e4d166e0931517026330
SHA1daec2a6d4841e4ea2863501d1341d784a992abe1
SHA25619a05417793c14ee11b2ca7c32f96cbf70f15cae8b26aec7c2e3fc3c0a0f94e7
SHA512aa70a62c5452d0e24298014baa8f8e1e281649bce888e5b3548c0e6051afdd4873242f12bb5c11ff85225feccca6eddcee108270133b37c445b340443144b124
-
C:\Users\Admin\Desktop\00387\HEUR-Trojan-Ransom.Win32.Shade.vho-271ef3c1d022829f0b15f2471d05a28d4786abafd0a9e1e742bde3f6b36872ad.exe
Filesize1.1MB
MD5a12e733ddbe6f404b27474fa0e5de61d
SHA1e8d0c95621a19131ef9480e58a8d6dd3d15c9acd
SHA256271ef3c1d022829f0b15f2471d05a28d4786abafd0a9e1e742bde3f6b36872ad
SHA512f27605a283e958690eb7ad50aa46110b6d155217ad09d658ad3f9c4368d4c66ab623a0cc3489d695a02db462fec3bcf8ebee13f9da1bd61e2e3db46de2d73ddf
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Agent.awnk-af53e36a62f237597b47d34349e40c16a3682a492fe7c320c7e834f6247e078a.exe
Filesize915KB
MD576d274c823439cf02f18a0deccfe70c5
SHA11cd7cd1fc0f7890da57af806e67061d2022abcd4
SHA256af53e36a62f237597b47d34349e40c16a3682a492fe7c320c7e834f6247e078a
SHA512a094877fd2fe166517446eeb2134268fedfeaacba20cd7b964adf7f34affba675fa598c4f9d2689342e07d2bcd8a0e08d2f11202cfd00abffea679bb9d300c48
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Agent.axkn-8587037c15463d10a17094ef8fa9f608cc20c99fa0206ce496b412f8c7f4a1b8.exe
Filesize55KB
MD5ae03734805e3b7ec0fa52c5a4f07a725
SHA1e20a4cc7f13f517491e772ce9e5c236aad2785f0
SHA2568587037c15463d10a17094ef8fa9f608cc20c99fa0206ce496b412f8c7f4a1b8
SHA51256a1cf95a67a79575061b53d6e3f7a8d424118bffddd539474f5ee8ca42cd83a71cebd9f19dea72960cab1bfcd699f85268348b1efe415a5f279971be8f6e09d
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Agent.ayme-8d44fdbedd0ec9ae59fad78bdb12d15d6903470eb1046b45c227193b233adda6.exe
Filesize437KB
MD5e26982b170856ca8ca96a2f41b2306fb
SHA1e467f2bc6f01f2a13effaf8f6283d616ccf40e2e
SHA2568d44fdbedd0ec9ae59fad78bdb12d15d6903470eb1046b45c227193b233adda6
SHA51280a636ae53f5049e1ec34e092d91be8f8cc11d1f96eb919bfabd814c677c1e68a773c102b4fd28f2335427173f76203815b60f133d1d4cf0834bded85931af0e
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Avaddon.ad-e24f69aa8738d14b85ad76a1783d51120b8b6ba467190fe7d8f96ad2969c8fdf.exe
Filesize2.1MB
MD5ccede1200a6e8eff54a358fa1e6d119a
SHA1e62fbe82dc5c1efbdecfd94791e023002d3c178b
SHA256e24f69aa8738d14b85ad76a1783d51120b8b6ba467190fe7d8f96ad2969c8fdf
SHA512d4c7e45c2f509e43b521bfbcd67474ef271fa12088f7a57794ba866cdd41ddd3e9ee8fc776b31dd0a0811e62542b813e97c0f3404f4e416066c1338193f7f6c7
-
C:\Users\Admin\Desktop\00387\Trojan-Ransom.Win32.Avaddon.j-cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46.exe
Filesize719KB
MD5275e4a63fc63c995b3e0d464919f211b
SHA151d85210c2f621ca14d92a8375ee24d62f9d7f44
SHA256cc95a8d100f70d0fbf4af14e852aa108bdb0e36db4054c3f60b3515818a71f46
SHA5121723fb4a624859cb49f1d00100a44c5104a8a6ee4685b0e0988fa54f929dc7d70d171034577a17db2e6529d6c19b49d2ba023c4c98e9637f92981a3c1a5c9dac
-
Filesize
8KB
MD53e9449f66cda54aa529090cc1ab96a2b
SHA1f7ef08685f95a66c0553c40b80e17b291db73e6f
SHA25653edac6f73be737811abc91a9be715c6485647522f3a019c71d8b33a78c743d9
SHA51215524e32a5ff3f7e7b2a9689dc055901057f061d8a20cf763633e740f1395a8d4c6b250208e85a56d8ee4ee36c2717d336bb7ac07548bcd29ab5b92ad1bae42e
-
Filesize
360KB
MD575329a6b77c3c6bacc735006fd7ec8dd
SHA129c0b5512146aac2ba5bcb4edfa42db7208040d5
SHA2567af2af5ab8ec54f64c4946b93059441ff586fae0232a086dba86dc07616253dc
SHA512046f5bb8c0f82493163e7151d8c7cb4815758178e8f3b79e06e0733dc831bc282aaa7af47da2419497802a78a1da4155464c93cb3d3121e9046a3cfeef0521a7
-
Filesize
15KB
MD5c7de03bb4d6d9250163f63bffd83e067
SHA15a840f370993310cf83dae1e4d6e3b3672908fe9
SHA256adabcadbe0ac503a86a2c75d63c531a06a1ed3778f2e6b47fdf44a04912112da
SHA512e9009ba7486d29d4b3024f625df476c3e6f631ba64b40f0de64f2509304519d79b36924112062e947ea7c7db4a8e9fdd62cf0f06e1b63765e9056a7bd77d337d
-
Filesize
808KB
MD514fc38cfb5241090980801a14ab6bd81
SHA1609585ae57df8138dffbc23067a8a85b2454b977
SHA256aea23a996162f5a7fdfb4dcf0e2d19ec21b2afa19b8bc0076102dfa45c037ef9
SHA5121767ac7259478d0d3f194726648e1cd861c86e6a11cec12f71fed0832c1e1c8bb1b68bf8229e916653d21b123a1bbb9948f1cd7d4b1981d3a6c5e5b29a144569
-
Filesize
12KB
MD59a00a03da5666a918540a3b6b1f59e22
SHA1c182f22c1a98082164a4034ae601f2d4fc686624
SHA2564636b351bdcdc33b7b72495bfae95161f25732922d4b521c30920d5ea3557cb9
SHA5129163bdc7dd1d0d5dd97c50fa22d3b97fd5925505729f45f10b34908da176859fc22fe79529012b8f29589477b7464dee7ab2921a38634de61e7bcaa0f351e71f
-
Filesize
575KB
MD5685d6b5b4b521305202351956903f599
SHA13f27d2923b4933f7e17a73cd392210f4d10ea92e
SHA2565c52dc254fe9b1574b83091cb0b2eb73d63b399cc361db204f46d49749e04f4b
SHA5120e1f918e518cabb62be82804cf755f03d79d58e4d381eac42802febe306e44926a2584715d649b9db785e532f47e3142bc5f6e69bb13030d6ccdd68fd277f237
-
Filesize
555KB
MD558bc0545c3d839797921706f73367bca
SHA19eb7666ca37cb2e9283646c6a56610d600811f32
SHA2560b3dc8ca02d26508c45515d0ad6e137845d6e9c84cf4ca8c3124f0d822682a00
SHA512441c1c123f03eb878f0b6e627eb419bd6471ddae9b59c88a11dbf7d6ec9f28eb14ace77b916d23d3a37f43bb71fbed1194e630873bcc11c6f66e2d9f43933065
-
Filesize
633KB
MD5f6f2d865a23d4f48975c4ce638a2d117
SHA19d7e5db3a8da6c8a4921da35e2a2b4631e7c6c21
SHA2564c4d1e7c9adf76e82224c1780ca832378a48c40db81db6512b5eee1827aefc75
SHA512269d8274811092bd6dcc2e2dd8f54464d07a411736c4ddd3b0bea60c180121e21f25a290da8e5a2e68089e84c70456b60bb913734b6af44528f21b64ed1d57fd
-
Filesize
456KB
MD501d7b98ffaf67bc04f1dd2fc42bdca8f
SHA159558b0180cdb9934fd88c9a635f4d06194f7074
SHA2565c6340c0cf089d24de2600512a8f9f4cd319532812d9dc0bb36ca3bd169c2a9f
SHA512f9d454c07beaddca8e41f63bf3f2503a61470dd584f12502edc86e48e70da6acf0bac38031f02341d4fcebddd409b0229489aeb6797c1607b1049a8fbcb743cb
-
Filesize
984KB
MD5f0584992e6c660858bf38cf8ae48520b
SHA120811ae1b1cf5a45d4f6f62f2001c169b1a9b8b5
SHA2564fb96a3503e8dc124af86775236e6b1523fe0e6ceb7b9cce4efc18f1bb5d4970
SHA5122708418eb972ab17684e9e50c9240925f0b3f9644fcc14288e3491aebb70918dcbfc0126b23a863ee187314570db04a18189195d7d9c5c5620ae86dd57646ab4
-
Filesize
576KB
MD5fa0f4fd1f9167458586c8cf33927b21d
SHA10f552c36d42e3ccc9c701c04237efa3024d74623
SHA2562959dc830039a61494e94305e0d90b8d1737d8d76b48504097ee5af545c4fbfb
SHA5128323499e6669c31562de9a177d3ce0651dcfa83024c2c9982ea7939d2b76332096bcd261c4ffbd80d48fbf57149faa5dd57c80b701fbd066ecc6075a7e3c467f
-
Filesize
1.1MB
MD53a0aecca4ea080013d20ea24da4ae273
SHA1c862b487bb832eb099783cb4ac0739c1ebd7c0a3
SHA256fc851defeca8c563c66de75b1c0a6e328dc81e6dd8df97ca02bb45bcc7286ee1
SHA512911340fc1473b3b2935d3daab7270b14247db37341d998481696e70f877179b1697e4586052d31bb03f0ebc75c24553e364883f0cc0455fc6b3b775b3a91d9ba
-
Filesize
960KB
MD5de928da7eaa014616ebb2bd2cf5d0173
SHA144fe8a8cce2ee601ebbabf5cfeb80bd3991c0fcf
SHA2568920705ebcd495f759cf539d566f8c63098f9d0e3be83ada38377f170fc54eda
SHA512227efabc416bed38cf75da701e9db2d4cda071476032847c6ff48aa7b7018a448331e323c16b5da78a27deb9d883c1c638e325168705062763a67e3c73a043fa
-
Filesize
624KB
MD55490369b15f689401d4134be1af3d189
SHA19eab761a2cf5c0c94053c803ddcb8be281b3cf80
SHA25678f80c66f791ce6bee4ad0d8cc4bc4ea20adf866858bad1c13c1ac3661be1c06
SHA51283f7efad5ab93bfaf832a6fdfca071168820a7465d417bd88f252ee9356c74c24cfeeaa839013fc72f495d7e9c6bd3e93fde4a7682248a30ec6552cebbf580e0
-
Filesize
609KB
MD5759bfe4b68efde55a5c47481981fc524
SHA12a0a8228865002d5fe120f7f96e801a72956c9cd
SHA256a5d5b39d137f01e487cdd1ef9be476e095cd607dd2de54d3fb4caa8b6a007005
SHA512b9f0a0045d1d9083541032140ff5aed6fbc23366bfee81fa4cf254d208620771ee75045c2e5af7705e6b9ce364cd43838c03dbb3e2d512119db8792d35dba980
-
Filesize
896KB
MD5082c5e7ba1fd0d65c9bb2eefb30376dd
SHA1b2f509bfe220f428865f109aa9f1b091f95e42dc
SHA256d944be75216799aa5ebae6d8031fa18e5255b1df4c618cee4c69f093565f0395
SHA5125df48b7c2bd5d60b6caf79cb21a1562dc7e9d3bbd7cabeb43e59446cf9302a1dcb658a258b8edba0b961495f31ab7f0326f2d1010d336bb05d3c6c841a37ea2f
-
Filesize
358KB
MD59c187580bfe7ffe6f6d314dbb8a2a7e8
SHA14632a7932d4680bba6a79a3ddcb0f5ca7f8c830e
SHA2563312581cd43dcf1c07b5646dfea61d0b34c96902b831ae260aaa5d60f3639820
SHA512a98efc659541399dd59bc3c6bb55fda7fc61053198c77526e15b07e29b2b47b8a144601f989ca241fd98aeeaed6bd3f204337e2747bd47be4afb26eb9815ac37
-
Filesize
645KB
MD5850cb3bc363ff5dbf4ebcb3a7c4ca09f
SHA1a151ce4d718b0e1630d3d7b164f49405ee5c6f71
SHA256cec0bb787cece521b20720f2e6632a658da63f6e7da7d68f402e8ba6b5782751
SHA512521e9994d7b2c89bef7e4758cdbd2a9edef5391fb5dc32309c6d79f9d681a033873605234522c2612a2132749910fff6d088694085e50f16825b0601f8121dfd
-
Filesize
394KB
MD5971c75aab87f47e926b9b7ad441a3eef
SHA13f988ec318dca3f7a1a517f404bc1894f58d34aa
SHA2563ca45f4b1b615e2ac28871c5de343af190a8f407ef3cf37b9beaa0a28e68548c
SHA5120b0f8414fde77e441131affdee9aa18d88e0c4a7230a2de26d666cb4387918d5f7359ab606d65971054836b46fd094f588ae9e3e32d5816564bf2d154794d416
-
Filesize
653KB
MD54e78b367bb7adf00183f5d531aaeb958
SHA10586ed89a635ef56ff86157f8d92145bdb01e330
SHA256d0c02edf6ea0526399d4d6b5b58eff77fd9f495ed206e93f4851e3bc419a9ea0
SHA512e0d5f7bbb6838543bdebd25f444741a6de109d54a2071cc7b1f344699bff96db41729c9d70ad553411339d2928b8fad42f924c58d00d1e331ab7455a22b6ae81
-
Filesize
397KB
MD5a29abe1908aeffe4b8675712bd181c28
SHA1802ea462f7ab6bb8d94301b101cfacb27a7adb23
SHA25617bb83027ae0fd43b2e6076b69d952e28158b176a8982164706051162b1aab07
SHA512df606621e71f095c514de78d44e2a3f8013f786e3aacead205eaa29556b776c05ed3bc14b48dc95a4edde5982e6734ea3e35741662627d9e8d110d2744ab9d4b
-
Filesize
983KB
MD5eb5667c27890005c224b9c441b1913bf
SHA1dcb8b3c39f9b030f93b8e6966eb97b5e40c9d939
SHA2563b16ab6d2a8e58a9c9a093512fc9df3b6373ab90842e447cd1cd34d5b9746009
SHA512d6462e24e443bf67b747773cd59056bf05c12ad03674bbf8fe6b330424cb9d3e44ce4ccf607b1292b4da46552151425ee9d5b77480ac1fcf870bcecf2ae0ceec
-
Filesize
478KB
MD552d4648ae89aa2aab65d9759ad2383d9
SHA1b96fc9b01cbe1d2e2b7061270b0552db1d463d7a
SHA25696b57dc3584f0b6716df71664ee6ae72fbb077016670098201dbbdaf037540ff
SHA512975c8f82c24a8a17b05a8c506e7c3ed9910507bf35bcff5f40023ee3d7ec2bb745527f5fc6eb2f1fd98f32cd7ad43f2db49b235f65ea87a2f2033325938bf09f
-
Filesize
303KB
MD5735a0ad30c9e2665c085e8cad7d52aa0
SHA188a3663430853af6e1b289a1bc604c07a6813c18
SHA256b12e35820b82e93b42f13ec37f22747fb233a6097bf3413b6c2984782f41c90a
SHA51284a55faf61bc519e71b2751f097e5e5e53367dc48fd3e97a1bd9157381d66451239e713b162e2088e3a14cd663094d65db1126f65991fa19b6328271cb5e7a2c
-
Filesize
24KB
MD55098359e9f3ab61b68f8a5a3d33efe31
SHA1de6e496a1c58596b5397f04ff6c09baf6956f479
SHA25606bbbad4e7e07ceaece50077fcb698456500809013feef2af43f19beb0bf375d
SHA512802e3e97a5ccb235086c106b8554d287c386537070821e5b669e63ae9d5197d347cfe50eea01c1fab4f98207ac592b5b7a4b6a24f3190e90eff86b2c526be8b2
-
Filesize
639KB
MD5870dc77cf3e9a901799d7a67965e6aef
SHA1614160c641c5071671794874ebe7b2a350d71ce1
SHA256d1fd8c383d346407877ebeb6c39ccc3cc169b252f0127722c9da7b370ae9064c
SHA512362163a281d7c1e360cd10fa88f1df7bbc666c8ba55721de096e0dccab433a53323cb5678dc91dd0c21c70164930293160b096077f696cbbae79c975dab03c5c
-
Filesize
518KB
MD53774b69935960bcc2727c44c2d0dd8bd
SHA19ba63aa95c626c7eab4721730931fa56c093b057
SHA256eca1b2e5bed142bdadeffb5235e0ad11b1dfecb38604e67615030e38ce253322
SHA5129232f6dd64e38c497d6c1713f0888d292828aa7d0a6882b708a120368591bc384e641bfc8a1ea36dd86db8550cdd3e03f4164f1d0f7246f4b442fc14d20baf91
-
Filesize
505KB
MD5845d5e6848d4ee57e12704f7019fd548
SHA12cd95ef21d4c938e57a9d792489b0baa9b94c1f4
SHA256c95a96d03660f3d9762996eb54f94c261f9f0df7326171fc9fba31b832c7b979
SHA5126c7f7c6832d71a277cc997508c85577ed9dd10eb5e3874f95c9e4aa3d2f58dafca90df8598cd02db0a7207a4e4cf35206f61fccebfebd7b30007ee5409dcef67
-
Filesize
1KB
MD53a10225653cfb40161fcb09de96d95cb
SHA151b55807ed8141899b781b5aa502e580a6627232
SHA2566efb080f8ba9e2cab88b878eb2b4aec35298ae29bcb79cce5dcd348c59602ca1
SHA51218dda0469d66f3ed811d55e8a785efc07617f1f01e2056f40eca8915985aa2c8faac995dfcd673edc8f147329975d60c9a0aa2fccf5998c93328546dd134a8d7