Resubmissions
08-12-2024 13:45
241208-q2cgqavpby 1003-12-2024 09:57
241203-ly26rawjfj 1002-12-2024 09:48
241202-ls1ezazmes 1002-12-2024 09:16
241202-k8hz7avkcl 1002-12-2024 08:33
241202-kf6ksaxmgv 1001-12-2024 23:22
241201-3cyd4sxkhx 10Analysis
-
max time kernel
17s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
freehacks.exe
Resource
win7-20240903-en
General
-
Target
freehacks.exe
-
Size
105.5MB
-
MD5
4647bc264b4344c7ca47ae9adc130ba9
-
SHA1
08280768ffd55e06203fc8f13d3e6f1745c7ee0c
-
SHA256
742e3f0ca6967c947c99cbbff7f3eaa7f5059a1bba1714a20afee3d85312a439
-
SHA512
9d2a9f90746e74819c441da86086fc716f2e9f54fbf77e4a1cfec2badb1d64b9fe0ba3e3f5304ad797613c27cb038fbddc551d4824b6445ab5f8d063e1424981
-
SSDEEP
3145728:iZGbexf7I4RniT0BEI43vBrYwY+pOhdFs8rBb:isbexTi64/Bbp0KG
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\RFSDBRWMX-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/b4958d966b2044df
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Hawkeye family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Xyeta.exe" Xyeta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Xyeta.exe" Xyeta.exe -
Satana
Ransomware family which also encrypts the system's Master Boot Record (MBR).
-
Satana family
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (272) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Xyeta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "calc.exe" Xyeta.exe -
resource yara_rule behavioral1/files/0x0007000000012118-8.dat aspack_v212_v242 behavioral1/files/0x0009000000016de4-47.dat aspack_v212_v242 behavioral1/files/0x000500000001926c-60.dat aspack_v212_v242 behavioral1/files/0x0005000000019278-73.dat aspack_v212_v242 behavioral1/files/0x0005000000019319-90.dat aspack_v212_v242 -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9bf0c776.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RFSDBRWMX-MANUAL.txt GandCrab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6b2043326b2044d56a.lock GandCrab.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\US3AC-DAXFT-XTXTX-HTOHT-XYYYY.HTML SporaRansomware.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDF8EB.tmp WannaCrypt0r.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDF8FF.tmp WannaCrypt0r.exe -
Executes dropped EXE 64 IoCs
pid Process 2136 Avoid.exe 2516 ChilledWindows.exe 2104 CookieClickerHack.exe 2720 CrazyNCS.exe 2860 Curfun.exe 2732 DesktopBoom.exe 2832 Flasher.exe 2728 Hydra.exe 2632 Launcher.exe 3044 Melting.exe 2228 Popup.exe 1868 rickroll.exe 2684 ScreenScrew.exe 1208 Explorer.EXE 1956 Time.exe 1384 Trololo.exe 1600 Vista.exe 2016 Windows-KB2670838.msu.exe 1084 WindowsUpdate.exe 2944 Monoxidex86.harmless.exe 1988 YouAreAnIdiot.exe 2268 RedBoot.exe 2304 RedEye.exe 2508 Rensenware.exe 1936 Rokku.exe 3032 satan.exe 1340 Satana.exe 1204 Seftad.exe 892 SporaRansomware.exe 888 satan.exe 2472 ViraLock.exe 2188 WannaCry.exe 2404 okgai.exe 1760 WannaCrypt0r.exe 1732 WinlockerVB6Blacksod.exe 1792 okgai.exe 2396 Xyeta.exe 2680 $uckyLocker.exe 1088 GmoEYggY.exe 1996 7ev3n.exe 1864 RQEcIwQg.exe 2976 Annabelle.exe 580 taskdl.exe 2172 BadRabbit.exe 2092 Birele.exe 2540 Cerber5.exe 316 CoronaVirus.exe 372 CryptoLocker.exe 584 CryptoWall.exe 1816 Satana.exe 668 DeriaLock.exe 820 Dharma.exe 2440 Fantom.exe 2144 GandCrab.exe 1876 InfinityCrypt.exe 2184 Krotten.exe 3440 NoMoreRansom.exe 3464 NotPetya.exe 3648 ViraLock.exe 3352 Petya.A.exe 3912 PolyRansom.exe 1072 PowerPoint.exe 3108 Bezilom.exe 3364 Bumerang.exe -
Loads dropped DLL 23 IoCs
pid Process 2400 freehacks.exe 2400 freehacks.exe 2400 freehacks.exe 2400 freehacks.exe 888 satan.exe 888 satan.exe 2472 ViraLock.exe 2472 ViraLock.exe 2472 ViraLock.exe 2472 ViraLock.exe 1760 WannaCrypt0r.exe 2400 freehacks.exe 1760 WannaCrypt0r.exe 1208 Explorer.EXE 1732 WinlockerVB6Blacksod.exe 1732 WinlockerVB6Blacksod.exe 1596 WerFault.exe 1596 WerFault.exe 1596 WerFault.exe 1596 WerFault.exe 2504 cmd.exe 1864 RQEcIwQg.exe 1864 RQEcIwQg.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2372 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*bf0c776 = "C:\\Users\\Admin\\AppData\\Roaming\\9bf0c776.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\AppData\\Roaming\\WannaCry.exe\" /r" WannaCry.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmoEYggY.exe = "C:\\Users\\Admin\\wyskgMYs\\GmoEYggY.exe" ViraLock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RQEcIwQg.exe = "C:\\ProgramData\\igIEgssk\\RQEcIwQg.exe" ViraLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\{3AA72D4F-4A3E-65F4-C3E9-D97C02965D68} = "C:\\Users\\Admin\\AppData\\Roaming\\Gona\\okgai.exe" taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmoEYggY.exe = "C:\\Users\\Admin\\wyskgMYs\\GmoEYggY.exe" GmoEYggY.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*bf0c77 = "C:\\9bf0c776\\9bf0c776.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\9bf0c776 = "C:\\Users\\Admin\\AppData\\Roaming\\9bf0c776.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RQEcIwQg.exe = "C:\\ProgramData\\igIEgssk\\RQEcIwQg.exe" RQEcIwQg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\erexru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\!satana!.txt" Satana.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\9bf0c77 = "C:\\9bf0c776\\9bf0c776.exe" explorer.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: GandCrab.exe File opened (read-only) \??\T: GandCrab.exe File opened (read-only) \??\V: GandCrab.exe File opened (read-only) \??\E: GandCrab.exe File opened (read-only) \??\J: GandCrab.exe File opened (read-only) \??\L: GandCrab.exe File opened (read-only) \??\X: GandCrab.exe File opened (read-only) \??\Z: GandCrab.exe File opened (read-only) \??\H: GandCrab.exe File opened (read-only) \??\I: GandCrab.exe File opened (read-only) \??\R: GandCrab.exe File opened (read-only) \??\S: GandCrab.exe File opened (read-only) \??\U: GandCrab.exe File opened (read-only) \??\W: GandCrab.exe File opened (read-only) \??\Y: GandCrab.exe File opened (read-only) \??\G: GandCrab.exe File opened (read-only) \??\K: GandCrab.exe File opened (read-only) \??\M: GandCrab.exe File opened (read-only) \??\N: GandCrab.exe File opened (read-only) \??\O: GandCrab.exe File opened (read-only) \??\P: GandCrab.exe File opened (read-only) \??\A: GandCrab.exe File opened (read-only) \??\B: GandCrab.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-addr.es 14 myexternalip.com -
System Binary Proxy Execution: Verclsid 1 TTPs 2 IoCs
Adversaries may abuse Verclsid to proxy execution of malicious code.
pid Process 5100 verclsid.exe 156 verclsid.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Seftad.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2268-500-0x0000000001320000-0x00000000015AE000-memory.dmp autoit_exe behavioral1/memory/2268-3222-0x0000000001320000-0x00000000015AE000-memory.dmp autoit_exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" WannaCrypt0r.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1108 taskhost.exe 1176 Dwm.exe 1108 taskhost.exe 1176 Dwm.exe 1208 Explorer.EXE 1108 taskhost.exe 1176 Dwm.exe 1208 Explorer.EXE 1108 taskhost.exe 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3032 set thread context of 888 3032 satan.exe 61 PID 2404 set thread context of 1792 2404 okgai.exe 68 PID 1340 set thread context of 1816 1340 Satana.exe 106 -
resource yara_rule behavioral1/files/0x0005000000019450-137.dat upx behavioral1/memory/2268-138-0x0000000001320000-0x00000000015AE000-memory.dmp upx behavioral1/files/0x0005000000019479-155.dat upx behavioral1/memory/1936-158-0x0000000000400000-0x000000000058D000-memory.dmp upx behavioral1/files/0x0005000000019b0d-261.dat upx behavioral1/memory/2396-268-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2268-500-0x0000000001320000-0x00000000015AE000-memory.dmp upx behavioral1/files/0x000500000001c84b-630.dat upx behavioral1/memory/2092-666-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/3364-2176-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x000500000001dc3d-2165.dat upx behavioral1/memory/2092-2463-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/3272-2749-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3364-2777-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2268-3222-0x0000000001320000-0x00000000015AE000-memory.dmp upx -
Drops file in Program Files directory 47 IoCs
description ioc Process File opened for modification C:\Program Files\BlockResume.mhtml GandCrab.exe File opened for modification C:\Program Files\UnpublishBackup.jpeg GandCrab.exe File created C:\Program Files (x86)\6b2043326b2044d56a.lock GandCrab.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\RFSDBRWMX-MANUAL.txt GandCrab.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6b2043326b2044d56a.lock GandCrab.exe File created C:\Program Files\6b2043326b2044d56a.lock GandCrab.exe File opened for modification C:\Program Files\EnterMount.vsdx GandCrab.exe File opened for modification C:\Program Files\SkipResolve.3gp2 GandCrab.exe File opened for modification C:\Program Files\StepReceive.php GandCrab.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b2043326b2044d56a.lock GandCrab.exe File opened for modification C:\Program Files\CloseClear.dwg GandCrab.exe File opened for modification C:\Program Files\ConvertSelect.aif GandCrab.exe File opened for modification C:\Program Files\ExitRemove.dib GandCrab.exe File opened for modification C:\Program Files\HideRepair.rmi GandCrab.exe File opened for modification C:\Program Files\LockPing.xlsb GandCrab.exe File opened for modification C:\Program Files\PushSubmit.avi GandCrab.exe File opened for modification C:\Program Files\RepairExport.wm GandCrab.exe File opened for modification C:\Program Files\ResolveStop.sql GandCrab.exe File opened for modification C:\Program Files\ShowDismount.odt GandCrab.exe File opened for modification C:\Program Files\SuspendUnlock.ppsx GandCrab.exe File opened for modification C:\Program Files\WatchEnable.zip GandCrab.exe File opened for modification C:\Program Files\WatchHide.xla GandCrab.exe File opened for modification C:\Program Files\WatchRestore.mp3 GandCrab.exe File opened for modification C:\Program Files\ClearCheckpoint.vsd GandCrab.exe File opened for modification C:\Program Files\EnterResume.xlsb GandCrab.exe File opened for modification C:\Program Files\NewJoin.eps GandCrab.exe File opened for modification C:\Program Files\SubmitRestart.htm GandCrab.exe File opened for modification C:\Program Files\UnprotectStop.mpeg2 GandCrab.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RFSDBRWMX-MANUAL.txt GandCrab.exe File created C:\Program Files\RFSDBRWMX-MANUAL.txt GandCrab.exe File opened for modification C:\Program Files\CompressTrace.tiff GandCrab.exe File opened for modification C:\Program Files\GroupRequest.vsx GandCrab.exe File opened for modification C:\Program Files\InvokeUnblock.rm GandCrab.exe File opened for modification C:\Program Files\StopCompress.tiff GandCrab.exe File opened for modification C:\Program Files\UnpublishUpdate.M2T GandCrab.exe File opened for modification C:\Program Files\FormatBackup.mpg GandCrab.exe File opened for modification C:\Program Files\FormatInvoke.pps GandCrab.exe File opened for modification C:\Program Files\LockCopy.pps GandCrab.exe File opened for modification C:\Program Files\ReadInvoke.mhtml GandCrab.exe File opened for modification C:\Program Files\ConvertFromEnable.bmp GandCrab.exe File opened for modification C:\Program Files\InitializeDisable.xml GandCrab.exe File opened for modification C:\Program Files\RegisterDisconnect.vdx GandCrab.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\RFSDBRWMX-MANUAL.txt GandCrab.exe File opened for modification C:\Program Files\RemoveHide.vssx GandCrab.exe File opened for modification C:\Program Files\UnprotectLock.dotx GandCrab.exe File created C:\Program Files (x86)\RFSDBRWMX-MANUAL.txt GandCrab.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6b2043326b2044d56a.lock GandCrab.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\perfc.dat NotPetya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 1596 1988 WerFault.exe 50 3252 2016 WerFault.exe 48 3344 1876 WerFault.exe 113 4368 668 WerFault.exe 108 3940 2680 WerFault.exe 72 5056 1936 WerFault.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCrypt0r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hydra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows-KB2670838.msu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Avoid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vista.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoWall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Popup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenScrew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GmoEYggY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RQEcIwQg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrazyNCS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flasher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bezilom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViraLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Monoxidex86.harmless.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language satan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Time.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedBoot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SporaRansomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinlockerVB6Blacksod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViraLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeriaLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GandCrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Curfun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Satana.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Birele.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InfinityCrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Krotten.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PowerPoint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YouAreAnIdiot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Seftad.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GandCrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GandCrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier GandCrab.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2688 vssadmin.exe 3992 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 5016 taskkill.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 2804 reg.exe 4064 reg.exe 3168 reg.exe 4052 reg.exe 3796 reg.exe 2844 reg.exe 2776 reg.exe 3916 reg.exe 3820 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 3032 satan.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2404 okgai.exe 2472 ViraLock.exe 2472 ViraLock.exe 1792 okgai.exe 1792 okgai.exe 1792 okgai.exe 2144 GandCrab.exe 2144 GandCrab.exe 2144 GandCrab.exe 2144 GandCrab.exe 2144 GandCrab.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 584 CryptoWall.exe 2672 explorer.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeSystemtimePrivilege 1956 Time.exe Token: SeDebugPrivilege 2016 Windows-KB2670838.msu.exe Token: SeDebugPrivilege 2016 Windows-KB2670838.msu.exe Token: SeSystemtimePrivilege 2184 Krotten.exe Token: SeDebugPrivilege 2440 Fantom.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2136 Avoid.exe 2396 Xyeta.exe 2516 ChilledWindows.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2540 Cerber5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2136 2400 freehacks.exe 30 PID 2400 wrote to memory of 2136 2400 freehacks.exe 30 PID 2400 wrote to memory of 2136 2400 freehacks.exe 30 PID 2400 wrote to memory of 2136 2400 freehacks.exe 30 PID 2400 wrote to memory of 2516 2400 freehacks.exe 31 PID 2400 wrote to memory of 2516 2400 freehacks.exe 31 PID 2400 wrote to memory of 2516 2400 freehacks.exe 31 PID 2400 wrote to memory of 2104 2400 freehacks.exe 32 PID 2400 wrote to memory of 2104 2400 freehacks.exe 32 PID 2400 wrote to memory of 2104 2400 freehacks.exe 32 PID 2400 wrote to memory of 2720 2400 freehacks.exe 33 PID 2400 wrote to memory of 2720 2400 freehacks.exe 33 PID 2400 wrote to memory of 2720 2400 freehacks.exe 33 PID 2400 wrote to memory of 2720 2400 freehacks.exe 33 PID 2400 wrote to memory of 2860 2400 freehacks.exe 35 PID 2400 wrote to memory of 2860 2400 freehacks.exe 35 PID 2400 wrote to memory of 2860 2400 freehacks.exe 35 PID 2400 wrote to memory of 2860 2400 freehacks.exe 35 PID 2400 wrote to memory of 2732 2400 freehacks.exe 36 PID 2400 wrote to memory of 2732 2400 freehacks.exe 36 PID 2400 wrote to memory of 2732 2400 freehacks.exe 36 PID 2400 wrote to memory of 2832 2400 freehacks.exe 37 PID 2400 wrote to memory of 2832 2400 freehacks.exe 37 PID 2400 wrote to memory of 2832 2400 freehacks.exe 37 PID 2400 wrote to memory of 2832 2400 freehacks.exe 37 PID 2400 wrote to memory of 2728 2400 freehacks.exe 38 PID 2400 wrote to memory of 2728 2400 freehacks.exe 38 PID 2400 wrote to memory of 2728 2400 freehacks.exe 38 PID 2400 wrote to memory of 2728 2400 freehacks.exe 38 PID 2400 wrote to memory of 2632 2400 freehacks.exe 39 PID 2400 wrote to memory of 2632 2400 freehacks.exe 39 PID 2400 wrote to memory of 2632 2400 freehacks.exe 39 PID 2400 wrote to memory of 2632 2400 freehacks.exe 39 PID 2400 wrote to memory of 2632 2400 freehacks.exe 39 PID 2400 wrote to memory of 2632 2400 freehacks.exe 39 PID 2400 wrote to memory of 2632 2400 freehacks.exe 39 PID 2400 wrote to memory of 3044 2400 freehacks.exe 40 PID 2400 wrote to memory of 3044 2400 freehacks.exe 40 PID 2400 wrote to memory of 3044 2400 freehacks.exe 40 PID 2400 wrote to memory of 2228 2400 freehacks.exe 41 PID 2400 wrote to memory of 2228 2400 freehacks.exe 41 PID 2400 wrote to memory of 2228 2400 freehacks.exe 41 PID 2400 wrote to memory of 2228 2400 freehacks.exe 41 PID 2400 wrote to memory of 1868 2400 freehacks.exe 42 PID 2400 wrote to memory of 1868 2400 freehacks.exe 42 PID 2400 wrote to memory of 1868 2400 freehacks.exe 42 PID 2400 wrote to memory of 2684 2400 freehacks.exe 44 PID 2400 wrote to memory of 2684 2400 freehacks.exe 44 PID 2400 wrote to memory of 2684 2400 freehacks.exe 44 PID 2400 wrote to memory of 2684 2400 freehacks.exe 44 PID 2400 wrote to memory of 1956 2400 freehacks.exe 45 PID 2400 wrote to memory of 1956 2400 freehacks.exe 45 PID 2400 wrote to memory of 1956 2400 freehacks.exe 45 PID 2400 wrote to memory of 1956 2400 freehacks.exe 45 PID 2400 wrote to memory of 1384 2400 freehacks.exe 46 PID 2400 wrote to memory of 1384 2400 freehacks.exe 46 PID 2400 wrote to memory of 1384 2400 freehacks.exe 46 PID 2400 wrote to memory of 1600 2400 freehacks.exe 47 PID 2400 wrote to memory of 1600 2400 freehacks.exe 47 PID 2400 wrote to memory of 1600 2400 freehacks.exe 47 PID 2400 wrote to memory of 1600 2400 freehacks.exe 47 PID 2400 wrote to memory of 2016 2400 freehacks.exe 48 PID 2400 wrote to memory of 2016 2400 freehacks.exe 48 PID 2400 wrote to memory of 2016 2400 freehacks.exe 48 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1544 attrib.exe 304 attrib.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1108 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2688
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\freehacks.exe"C:\Users\Admin\AppData\Local\Temp\freehacks.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\Avoid.exe"C:\Users\Admin\AppData\Roaming\Avoid.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2136
-
-
C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"C:\Users\Admin\AppData\Roaming\ChilledWindows.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2516
-
-
C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"C:\Users\Admin\AppData\Roaming\CookieClickerHack.exe"3⤵
- Executes dropped EXE
PID:2104
-
-
C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"C:\Users\Admin\AppData\Roaming\CrazyNCS.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Roaming\Curfun.exe"C:\Users\Admin\AppData\Roaming\Curfun.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"C:\Users\Admin\AppData\Roaming\DesktopBoom.exe"3⤵
- Executes dropped EXE
PID:2732
-
-
C:\Users\Admin\AppData\Roaming\Flasher.exe"C:\Users\Admin\AppData\Roaming\Flasher.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Users\Admin\AppData\Roaming\Hydra.exe"C:\Users\Admin\AppData\Roaming\Hydra.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Users\Admin\AppData\Roaming\Launcher.exe"C:\Users\Admin\AppData\Roaming\Launcher.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Users\Admin\AppData\Roaming\Melting.exe"C:\Users\Admin\AppData\Roaming\Melting.exe"3⤵
- Executes dropped EXE
PID:3044
-
-
C:\Users\Admin\AppData\Roaming\Popup.exe"C:\Users\Admin\AppData\Roaming\Popup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Users\Admin\AppData\Roaming\rickroll.exe"C:\Users\Admin\AppData\Roaming\rickroll.exe"3⤵
- Executes dropped EXE
PID:1868
-
-
C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"C:\Users\Admin\AppData\Roaming\ScreenScrew.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\Time.exe"C:\Users\Admin\AppData\Roaming\Time.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Users\Admin\AppData\Roaming\Trololo.exe"C:\Users\Admin\AppData\Roaming\Trololo.exe"3⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\system32\taskkill.exetaskkill.exe /f /im explorer.exe4⤵
- Kills process with taskkill
PID:5016
-
-
-
C:\Users\Admin\AppData\Roaming\Vista.exe"C:\Users\Admin\AppData\Roaming\Vista.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"C:\Users\Admin\AppData\Roaming\Windows-KB2670838.msu.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 6564⤵
- Program crash
PID:3252
-
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"C:\Users\Admin\AppData\Roaming\YouAreAnIdiot.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 7324⤵
- Loads dropped DLL
- Program crash
PID:1596
-
-
-
C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"C:\Users\Admin\AppData\Roaming\Monoxidex86.harmless.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\RedBoot.exe"C:\Users\Admin\AppData\Roaming\RedBoot.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Users\Admin\91111980\protect.exe"C:\Users\Admin\91111980\protect.exe"4⤵PID:4228
-
-
C:\Users\Admin\91111980\assembler.exe"C:\Users\Admin\91111980\assembler.exe" -f bin "C:\Users\Admin\91111980\boot.asm" -o "C:\Users\Admin\91111980\boot.bin"4⤵PID:4272
-
-
C:\Users\Admin\91111980\overwrite.exe"C:\Users\Admin\91111980\overwrite.exe" "C:\Users\Admin\91111980\boot.bin"4⤵PID:4328
-
-
-
C:\Users\Admin\AppData\Roaming\RedEye.exe"C:\Users\Admin\AppData\Roaming\RedEye.exe"3⤵
- Executes dropped EXE
PID:2304
-
-
C:\Users\Admin\AppData\Roaming\Rensenware.exe"C:\Users\Admin\AppData\Roaming\Rensenware.exe"3⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 5124⤵PID:1540
-
-
-
C:\Users\Admin\AppData\Roaming\Rokku.exe"C:\Users\Admin\AppData\Roaming\Rokku.exe"3⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 884⤵
- Program crash
PID:5056
-
-
-
C:\Users\Admin\AppData\Roaming\satan.exe"C:\Users\Admin\AppData\Roaming\satan.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Users\Admin\AppData\Roaming\satan.exe"C:\Users\Admin\AppData\Roaming\satan.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:888 -
C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"C:\Users\Admin\AppData\Roaming\Gona\okgai.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_768663b8.bat"5⤵PID:1644
-
-
-
-
C:\Users\Admin\AppData\Roaming\Satana.exe"C:\Users\Admin\AppData\Roaming\Satana.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Users\Admin\AppData\Roaming\Satana.exe"C:\Users\Admin\AppData\Roaming\Satana.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
C:\Users\Admin\AppData\Roaming\Seftad.exe"C:\Users\Admin\AppData\Roaming\Seftad.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"C:\Users\Admin\AppData\Roaming\SporaRansomware.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x4014⤵
- System Binary Proxy Execution: Verclsid
PID:156
-
-
-
C:\Users\Admin\AppData\Roaming\ViraLock.exe"C:\Users\Admin\AppData\Roaming\ViraLock.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Users\Admin\wyskgMYs\GmoEYggY.exe"C:\Users\Admin\wyskgMYs\GmoEYggY.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\ProgramData\igIEgssk\RQEcIwQg.exe"C:\ProgramData\igIEgssk\RQEcIwQg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Users\Admin\AppData\Roaming\ViraLock.exeC:\Users\Admin\AppData\Roaming\ViraLock5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Roaming\ViraLock"6⤵PID:3908
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies registry key
PID:4064
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:3168
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:4052
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BkEQoUAk.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""6⤵PID:4036
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:2804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:2776
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:2844
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RwMMYIAc.bat" "C:\Users\Admin\AppData\Roaming\ViraLock.exe""4⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
-
-
C:\Users\Admin\AppData\Roaming\WannaCry.exe"C:\Users\Admin\AppData\Roaming\WannaCry.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c 35461733135397.bat4⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs5⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
-
-
C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"C:\Users\Admin\AppData\Roaming\WannaCrypt0r.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\attrib.exeattrib +h .4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1544
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Users\Admin\AppData\Roaming\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:580
-
-
C:\Windows\SysWOW64\cmd.execmd /c 126641733135400.bat4⤵
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs5⤵PID:3852
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE4⤵
- Views/modifies file attributes
PID:304
-
-
C:\Users\Admin\AppData\Roaming\@[email protected]PID:3412
-
-
C:\Windows\SysWOW64\cmd.exePID:3736
-
C:\Users\Admin\AppData\Roaming\@[email protected]PID:4112
-
-
-
-
C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Roaming\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Roaming\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "4⤵PID:4756
-
-
-
C:\Users\Admin\AppData\Roaming\Xyeta.exe"C:\Users\Admin\AppData\Roaming\Xyeta.exe"3⤵
- Modifies WinLogon for persistence
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2396
-
-
C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"C:\Users\Admin\AppData\Roaming\$uckyLocker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 6324⤵
- Program crash
PID:3940
-
-
-
C:\Users\Admin\AppData\Roaming\7ev3n.exe"C:\Users\Admin\AppData\Roaming\7ev3n.exe"3⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\system.exe"C:\Users\Admin\AppData\Local\system.exe"4⤵PID:3704
-
-
-
C:\Users\Admin\AppData\Roaming\Annabelle.exe"C:\Users\Admin\AppData\Roaming\Annabelle.exe"3⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Roaming\BadRabbit.exe"C:\Users\Admin\AppData\Roaming\BadRabbit.exe"3⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 154⤵PID:140
-
-
-
C:\Users\Admin\AppData\Roaming\Birele.exe"C:\Users\Admin\AppData\Roaming\Birele.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Users\Admin\AppData\Roaming\Cerber5.exe"C:\Users\Admin\AppData\Roaming\Cerber5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2540
-
-
C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"C:\Users\Admin\AppData\Roaming\CoronaVirus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:372 -
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4496
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4508
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4516
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4556
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4620
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4660
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4728
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4764
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4780
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4856
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4088
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4952
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:5036
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:5064
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:2716
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:764
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:5088
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:5100
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:5116
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:152
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3488
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:1840
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3116
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3608
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4536
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:5096
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4204
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3688
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4268
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:2672
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3384
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3152
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4504
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4736
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4152
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4136
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4768
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:136
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:984
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:1428
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3704
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3200
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3260
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:1944
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4800
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:1336
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3300
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3940
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4120
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:1924
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4904
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:164
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3920
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3616
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:2896
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:168
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:4692
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:1980
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3140
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3064
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:5032
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:3988
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:2216
-
-
C:\Users\Admin\AppData\Roaming\CryptoLocker.exe"C:\Users\Admin\AppData\Roaming\CryptoLocker.exe" /w000000C84⤵PID:1796
-
-
-
C:\Users\Admin\AppData\Roaming\CryptoWall.exe"C:\Users\Admin\AppData\Roaming\CryptoWall.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:584 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"4⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2672 -
C:\Windows\syswow64\svchost.exe-k netsvcs5⤵
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
PID:3992
-
-
-
-
C:\Users\Admin\AppData\Roaming\DeriaLock.exe"C:\Users\Admin\AppData\Roaming\DeriaLock.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 6124⤵
- Program crash
PID:4368
-
-
-
C:\Users\Admin\AppData\Roaming\Dharma.exe"C:\Users\Admin\AppData\Roaming\Dharma.exe"3⤵
- Executes dropped EXE
PID:820
-
-
C:\Users\Admin\AppData\Roaming\Fantom.exe"C:\Users\Admin\AppData\Roaming\Fantom.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Users\Admin\AppData\Roaming\GandCrab.exe"C:\Users\Admin\AppData\Roaming\GandCrab.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"C:\Users\Admin\AppData\Roaming\InfinityCrypt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 6004⤵
- Program crash
PID:3344
-
-
-
C:\Users\Admin\AppData\Roaming\Krotten.exe"C:\Users\Admin\AppData\Roaming\Krotten.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"C:\Users\Admin\AppData\Roaming\NoMoreRansom.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Users\Admin\AppData\Roaming\NotPetya.exe"C:\Users\Admin\AppData\Roaming\NotPetya.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3464
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\PetrWrap3⤵PID:3268
-
-
C:\Users\Admin\AppData\Roaming\Petya.A.exe"C:\Users\Admin\AppData\Roaming\Petya.A.exe"3⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\AppData\Roaming\PolyRansom.exe"C:\Users\Admin\AppData\Roaming\PolyRansom.exe"3⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Roaming\PolyRansom"4⤵PID:3156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:3820
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:3916
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
PID:3796
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RQwcAEcI.bat" "C:\Users\Admin\AppData\Roaming\PolyRansom.exe""4⤵PID:4040
-
-
-
C:\Users\Admin\AppData\Roaming\PowerPoint.exe"C:\Users\Admin\AppData\Roaming\PowerPoint.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Users\Admin\AppData\Roaming\Bezilom.exe"C:\Users\Admin\AppData\Roaming\Bezilom.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Users\Admin\AppData\Roaming\Bumerang.exe"C:\Users\Admin\AppData\Roaming\Bumerang.exe"3⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\SysWOW64\ddraw32.dllC:\Windows\system32\ddraw32.dll4⤵PID:3272
-
-
C:\Windows\SysWOW64\ddraw32.dllC:\Windows\system32\ddraw32.dll :C:\Users\Admin\AppData\Roaming\Bumerang.exe4⤵PID:3252
-
-
-
C:\Users\Admin\AppData\Roaming\Fagot.a.exe"C:\Users\Admin\AppData\Roaming\Fagot.a.exe"3⤵PID:3768
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\HeadTail.vbs"3⤵PID:3748
-
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {871C5380-42A0-1069-A2EA-08002B30309D} /I {000214E6-0000-0000-C000-000000000046} /X 0x4012⤵
- System Binary Proxy Execution: Verclsid
PID:5100
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1580
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1514662147-1101916255-870117591127602195429391355420297047011497896101595886359"1⤵PID:3004
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "533515787-1738167246258916508748044399742047307869905828-17967773021113131873"1⤵PID:1592
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1711119370-113709395218865051219053838441387485019-1942401196-1339430302-1180878217"1⤵PID:2780
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "254497598412324902-2065445553-20748075291419358680-1421429058-21255895881080975784"1⤵PID:1776
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1378428098549471286-1421370185-1890501149-16662438-328566376-905356993-1927572050"1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
4Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Verclsid
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5110bc8138007013261f83b8808af568f
SHA13cfcd68097453a82bfec7d2265acbfddea5a9694
SHA256664261c13650851730429276e8e1ae7947c08e6d44999b01bff0db2ddbe00ff4
SHA512ea592286813475321898c804780bdbf9a26d90035dd217072fa5c4914e4782ac11f2922234db219734de9dd5b1b7af6845d3273f413f95c8d683f5b73997c7e5
-
Filesize
1.2MB
MD5e1c90002f97b22b0756e18e60e37cf6d
SHA1a46c7eddc835a2e4786bfea74803326a64fca0e1
SHA2567d37dad36011310c7af86ea642c785cd4b3d1c9befc8d33fb1e63d397b0c0983
SHA512739de8b2177e34e96d4284b8322b3b5b2c40e43232c184afa0bb3834f0c81f4986a98e3b29d0f202bf8d6c1f85aada9003f7846a8e23bd7a5a56685feffad2dc
-
Filesize
2.9MB
MD5ebe75f3285a9952cc313e96e6f49f684
SHA1b3dbc7fcd3c219a21aa5d9e4106dd9a3548d2ac4
SHA25639a2fd03dbd94f40bb6fecb7ed59b047815c766da0c74d4286bc1adfb0158d71
SHA512d4f8f53648b382ea2eec9cd3fb2d90745c19ccca8c341a80612ba04b3629706c07a2b8544eb85b1acb9fbd350f6acdaa60bfedda339c5895bc5a2bce385f361a
-
Filesize
24KB
MD573d1da91a59b3cb4715e28bfc6cb95e4
SHA145fbd7d45b5a805cfd708bbde0092455de2b657f
SHA256d23dd97fb2b812af621146a912d2cdaccff29e836ba33266d1f81e083ad1c39d
SHA5121cc73b0fb0c8f3f53e039071dfc15e8b5f4e4872f66f1dfb4a37532f48417dfa227564f024ebf472635690f2c284ff0c53c14fe4b9854f0b660be854afa350dd
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
4B
MD59a79da2b5f2311396019f832f2250956
SHA1a409a7fb4baf0b70826eab6f9a59b61d9c284664
SHA25689451ecf442f1ad9a69fa84e1ad591753c82d350b1f3faa202497c5ba122a67b
SHA5129a075f3ba399c0868f4f50a7f2d36a3cb157bacc478ca43f52fe9daac2b89681e93ca4d2cf265a06a4b7c65dff6691b59eb0ab18a9495f2664163222cec2f65d
-
Filesize
4B
MD5762778409ddcbfd1ac06b94605b78c1d
SHA1eb9c8bec27a8efc596b06bd605ead76db9c25123
SHA256aafd80e601becad93c141684b8166d3b4ddfe65d7bbd29c3e7b47c0084aed4cc
SHA5123512bcfc5be9d4f10f87dbc170a6a15c8dec8e427a392d9ae6c539f96518d50d1dc782bb1f9a2398a73c65fea8f19f988788ecff1e84e9aeae834c383d4bc51c
-
Filesize
4B
MD50c8173d09ff82698fb72f8a6c31e2ad5
SHA18b62ed5095143495dbc4e97260155cb8b1a16678
SHA256bed6212f185b417636b434ff529f83a256d47867b99b4343d7b7bbc527f22fb6
SHA512e054f94201b03ac6971d118f795731b781c7b56dbaad44bd012448d17aaa451b73765f2357492af9948e7d1d0aeaa96ef489deb950cff9df0d3dd1b15e46c165
-
Filesize
414KB
MD5c850f942ccf6e45230169cc4bd9eb5c8
SHA151c647e2b150e781bd1910cac4061a2cee1daf89
SHA25686e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA5122b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9
-
Filesize
334B
MD5d60ef26cdec915e1e06f4ff89ce1ccff
SHA1fc64aa9411af7b4e33150bac85ead3b0303c1b9b
SHA2561e5a53b8996bb0672bc19e0a4bdd90fda584765cfb97a351ab3140e97bcd7dc2
SHA512fc863758a533eff85e933eb15b3e6707966807874ea92e8d5673f8624920ad3e718fd5baf86d16356679189226ea1604e4c9099683ddae33720f3e26686356f5
-
Filesize
330B
MD59f5718e808c505fa040e46bbccfe27f6
SHA13f0db8829183ea2242d90c019ec681c8321512c8
SHA256a33f96b5bfcc643ba255fdd19b20a2efdb6c51639b522547dd4b59e08e2924dd
SHA512dd96bca36023a1e1463a14e5d3877cc78ee59bc9f06b5d82f83cfe2e0eacd1c6fb44f8b22ac23ff2fde3a518907a9b83f954dc062b113def875cb11b09a841cd
-
Filesize
315KB
MD59f8bc96c96d43ecb69f883388d228754
SHA161ed25a706afa2f6684bb4d64f69c5fb29d20953
SHA2567d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
SHA512550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6
-
C:\Users\Admin\AppData\Roaming\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
248KB
MD520d2c71d6d9daf4499ffc4a5d164f1c3
SHA138e5dcd93f25386d05a34a5b26d3fba1bf02f7c8
SHA2563ac8cc58dcbceaec3dab046aea050357e0e2248d30b0804c738c9a5b037c220d
SHA5128ffd56fb3538eb60da2dde9e3d6eee0dac8419c61532e9127f47c4351b6e53e01143af92b2e26b521e23cdbbf15d7a358d3757431e572e37a1eede57c7d39704
-
Filesize
28KB
MD58e9d7feb3b955e6def8365fd83007080
SHA1df7522e270506b1a2c874700a9beeb9d3d233e23
SHA25694d2b1da2c4ce7db94ee9603bc2f81386032687e7c664aff6460ba0f5dac0022
SHA5124157a5628dc7f47489be2c30dbf2b14458a813eb66e942bba881615c101df25001c09afb9a54f88831fa4c1858f42d897f8f55fbf6b4c1a82d2509bd52ba1536
-
Filesize
116KB
MD541789c704a0eecfdd0048b4b4193e752
SHA1fb1e8385691fa3293b7cbfb9b2656cf09f20e722
SHA256b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23
SHA51276391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea
-
Filesize
26KB
MD5b6c78677b83c0a5b02f48648a9b8e86d
SHA10d90c40d2e9e8c58c1dafb528d6eab45e15fda81
SHA256706fce69fea67622b03fafb51ece076c1fdd38892318f8cce9f2ec80aabca822
SHA512302acca8c5dd310f86b65104f7accd290014e38d354e97e4ffafe1702b0a13b90e4823c274b51bcc9285419e69ff7111343ac0a64fd3c8b67c48d7bbd382337b
-
Filesize
313KB
MD5fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89
-
Filesize
4.4MB
MD56a4853cd0584dc90067e15afb43c4962
SHA1ae59bbb123e98dc8379d08887f83d7e52b1b47fc
SHA256ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec
SHA512feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996
-
Filesize
68KB
MD5bc1e7d033a999c4fd006109c24599f4d
SHA1b927f0fc4a4232a023312198b33272e1a6d79cec
SHA25613adae722719839af8102f98730f3af1c5a56b58069bfce8995acd2123628401
SHA512f5d9b8c1fd9239894ec9c075542bff0bcef79871f31038e627ae257b8c1db9070f4d124448a78e60ccc8bc12f138102a54825e9d7647cd34832984c7c24a6276
-
Filesize
122KB
MD5d043ba91e42e0d9a68c9866f002e8a21
SHA1e9f177e1c57db0a15d1dc6b3e6c866d38d85b17c
SHA2566820c71df417e434c5ad26438c901c780fc5a80b28a466821b47d20b8424ef08
SHA5123e9783646e652e9482b3e7648fb0a5f7c8b6c386bbc373d5670d750f6f99f6137b5501e21332411609cbcc0c20f829ab8705c2835e2756455f6754c9975ac6bd
-
Filesize
132KB
MD5919034c8efb9678f96b47a20fa6199f2
SHA1747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4
-
Filesize
138KB
MD50b3b2dff5503cb032acd11d232a3af55
SHA16efc31c1d67f70cf77c319199ac39f70d5a7fa95
SHA256ef878461a149024f3065121ff4e165731ecabef1b94b0b3ed2eda010ad39202b
SHA512484014d65875e706f7e5e5f54c2045d620e5cce5979bf7f37b45c613e6d948719c0b8e466df5d8908706133ce4c4b71a11b804417831c9dbaf72b6854231ea17
-
Filesize
1.1MB
MD5f0a661d33aac3a3ce0c38c89bec52f89
SHA1709d6465793675208f22f779f9e070ed31d81e61
SHA256c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a
SHA51257cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443
-
Filesize
373KB
MD530cdab5cf1d607ee7b34f44ab38e9190
SHA1d4823f90d14eba0801653e8c970f47d54f655d36
SHA2561517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f
SHA512b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3
-
Filesize
246KB
MD59254ca1da9ff8ad492ca5fa06ca181c6
SHA170fa62e6232eae52467d29cf1c1dacb8a7aeab90
SHA25630676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6
SHA512a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a
-
Filesize
291KB
MD5e6b43b1028b6000009253344632e69c4
SHA1e536b70e3ffe309f7ae59918da471d7bf4cadd1c
SHA256bfb9db791b8250ffa8ebc48295c5dbbca757a5ed3bbb01de12a871b5cd9afd5a
SHA51207da214314673407a7d3978ee6e1d20bf1e02f135bf557e86b50489ecc146014f2534515c1b613dba96e65489d8c82caaa8ed2e647684d61e5e86bd3e8251adf
-
Filesize
43KB
MD5b2eca909a91e1946457a0b36eaf90930
SHA13200c4e4d0d4ece2b2aadb6939be59b91954bcfa
SHA2560b6c0af51cde971b3e5f8aa204f8205418ab8c180b79a5ac1c11a6e0676f0f7c
SHA512607d20e4a46932c7f4d9609ef9451e2303cd79e7c4778fe03f444e7dc800d6de7537fd2648c7c476b9f098588dc447e8c39d8b21cd528d002dfa513a19c6ebbf
-
Filesize
53KB
MD587ccd6f4ec0e6b706d65550f90b0e3c7
SHA1213e6624bff6064c016b9cdc15d5365823c01f5f
SHA256e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4
SHA512a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990
-
Filesize
197KB
MD57506eb94c661522aff09a5c96d6f182b
SHA1329bbdb1f877942d55b53b1d48db56a458eb2310
SHA256d5b962dfe37671b5134f0b741a662610b568c2b5374010ee92b5b7857d87872c
SHA512d815a9391ef3d508b89fc221506b95f4c92d586ec38f26aec0f239750f34cf398eed3d818fa439f6aa6ed3b30f555a1903d93eeeec133b80849a4aa6685ec070
-
Filesize
12KB
MD5833619a4c9e8c808f092bf477af62618
SHA1b4a0efa26f790e991cb17542c8e6aeb5030d1ebf
SHA25692a284981c7ca33f1af45ce61738479fbcbb5a4111f5498e2cb54931c8a36c76
SHA5124f231fc16339d568b5cf9353133aeae835eb262dab68bc80d92f37b43df64dce4fae0e913cbaa3bb61351a759aeecf9d280bc5779b0853c980559a654d6cca11
-
Filesize
131KB
MD5bd65d387482def1fe00b50406f731763
SHA1d06a2ba2e29228f443f97d1dd3a8da5dd7df5903
SHA2561ab7375550516d7445c47fd9b551ed864f227401a14ff3f1ff0d70caca3bd997
SHA512351ecd109c4d49bc822e8ade73a9516c4a531ebcda63546c155e677dcff19708068dc588b2fcf30cad086238e8b206fc5f349d37dda02d3c3a8d9b570d92e4d9
-
Filesize
220KB
MD53ed3fb296a477156bc51aba43d825fc0
SHA19caa5c658b1a88fee149893d3a00b34a8bb8a1a6
SHA2561898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423
SHA512dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e
-
Filesize
373KB
MD59c3e9e30d51489a891513e8a14d931e4
SHA14e5a5898389eef8f464dee04a74f3b5c217b7176
SHA256f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8
SHA512bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7
-
Filesize
136KB
MD570108103a53123201ceb2e921fcfe83c
SHA1c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3
SHA2569c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d
SHA512996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b
-
Filesize
1.2MB
MD5e0340f456f76993fc047bc715dfdae6a
SHA1d47f6f7e553c4bc44a2fe88c2054de901390b2d7
SHA2561001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887
SHA512cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc
-
Filesize
10.6MB
MD5e9e5596b42f209cc058b55edc2737a80
SHA1f30232697b3f54e58af08421da697262c99ec48b
SHA2569ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305
SHA512e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7
-
Filesize
96KB
MD560335edf459643a87168da8ed74c2b60
SHA161f3e01174a6557f9c0bfc89ae682d37a7e91e2e
SHA2567bf5623f0a10dfa148a35bebd899b7758612f1693d2a9910f716cf15a921a76a
SHA512b4e5e4d4f0b4a52243d6756c66b4fe6f4b39e64df7790072046e8a3dadad3a1be30b8689a1bab8257cc35cb4df652888ddf62b4e1fccb33e1bbf1f5416d73efb
-
Filesize
666KB
MD597512f4617019c907cd0f88193039e7c
SHA124cfa261ee30f697e7d1e2215eee1c21eebf4579
SHA256438888ef36bad1079af79daf152db443b4472c5715a7b3da0ba24cc757c53499
SHA512cfbb8dd91434f917d507cb919aa7e6b16b7b2056d56185f6ad5b6149e05629325cdb3df907f58bb3f634b17a9989bf5b6d6b81f5396a3a556431742ed742ac4a
-
Filesize
49KB
MD546bfd4f1d581d7c0121d2b19a005d3df
SHA15b063298bbd1670b4d39e1baef67f854b8dcba9d
SHA256683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
SHA512b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
Filesize
111KB
MD5e87a04c270f98bb6b5677cc789d1ad1d
SHA18c14cb338e23d4a82f6310d13b36729e543ff0ca
SHA256e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338
SHA5128784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13
-
Filesize
48KB
MD586a3a3ce16360e01933d71d0bf1f2c37
SHA1af54089e3601c742d523b507b3a0793c2b6e60be
SHA2562ebe23ba9897d9c127b9c0a737ba63af8d0bcd76ec866610cc0b5de2f62b87bd
SHA51265a3571cf5b057d2c3ce101346947679f162018fa5eadf79c5a6af6c0a3bc9b12731ff13f27629b14983ef8bc73fa9782cc0a9e6c44b0ffc2627da754c324d6e
-
Filesize
24KB
MD54a4a6d26e6c8a7df0779b00a42240e7b
SHA18072bada086040e07fa46ce8c12bf7c453c0e286
SHA2567ad9ed23a91643b517e82ad5740d24eca16bcae21cfe1c0da78ee80e0d1d3f02
SHA512c7a7b15d8dbf8e8f8346a4dab083bb03565050281683820319906da4d23b97b39e88f841b30fc8bd690c179a8a54870238506ca60c0f533d34ac11850cdc1a95
-
Filesize
111KB
MD59d0d2fcb45b1ff9555711b47e0cd65e5
SHA1958f29a99cbb135c92c5d1cdffb9462be35ee9fd
SHA256dc476ae39effdd80399b6e36f1fde92c216a5bbdb6b8b2a7ecbe753e91e4c993
SHA5128fd4ce4674cd52a3c925149945a7a50a139302be17f6ee3f30271ebe1aa6d92bcb15a017dca989cd837a5d23cd56eaacc6344dc7730234a4629186976c857ca9
-
Filesize
3.0MB
MD5b6d61b516d41e209b207b41d91e3b90d
SHA1e50d4b7bf005075cb63d6bd9ad48c92a00ee9444
SHA2563d0efd55bde5fb7a73817940bac2a901d934b496738b7c5cab7ea0f6228e28fe
SHA5123217fc904e4c71b399dd273786634a6a6c19064a9bf96960df9b3357001c12b9547813412173149f6185eb5d300492d290342ec955a8347c6f9dcac338c136da
-
Filesize
1KB
MD5122b48076e0ef7eeb1216486abe7bb43
SHA144897c8f83db930da995ad8b40f117f6bb47c7b8
SHA25671c3b0b9f65b6fa69f440cc8665cd6d4197bfc78d9db6c9c7aa7c972177c034e
SHA512e35db63f5c6028379feeeb81671473cfef82f3126d9952f4e7322fdf49817f12e3df61ba06c6e5867a07f7a31a240a0388e464595b43ecf92ccaa632b0e711d5
-
Filesize
194KB
MD58803d517ac24b157431d8a462302b400
SHA1b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e
SHA256418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786
SHA51238fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50
-
Filesize
1.9MB
MD5faa6cb3e816adaeaabf2930457c79c33
SHA16539de41b48d271bf4237e6eb09b0ee40f9a2140
SHA2566680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b
SHA51258859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66
-
Filesize
224KB
MD55c7fb0927db37372da25f270708103a2
SHA1120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206
-
Filesize
3.4MB
MD584c82835a5d21bbcf75a61706d8ab549
SHA15ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA51290723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
Filesize
728KB
MD56e49c75f701aa059fa6ed5859650b910
SHA1ccb7898c509c3a1de96d2010d638f6a719f6f400
SHA256f91f02fd27ada64f36f6df59a611fef106ff7734833dea825d0612e73bdfb621
SHA512ccd1b581a29de52d2313a97eb3c3b32b223dba1e7a49c83f7774b374bc2d16b13fba9566de6762883f3b64ed8e80327b454e5d32392af2a032c22653fed0fff8
-
Filesize
760KB
MD5515198a8dfa7825f746d5921a4bc4db9
SHA1e1da0b7f046886c1c4ff6993f7f98ee9a1bc90ae
SHA2560fda176b199295f72fafc3bc25cefa27fa44ed7712c3a24ca2409217e430436d
SHA5129e47037fe40b79ebf056a9c6279e318d85da9cd7e633230129d77a1b8637ecbafc60be38dd21ca9077ebfcb9260d87ff7fcc85b8699b3135148fe956972de3e8
-
Filesize
126KB
MD53531cf7755b16d38d5e9e3c43280e7d2
SHA119981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA25676133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA5127b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd
-
Filesize
2.4MB
MD5dbfbf254cfb84d991ac3860105d66fc6
SHA1893110d8c8451565caa591ddfccf92869f96c242
SHA25668b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c
SHA5125e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d
-
Filesize
84KB
MD59d15a3b314600b4c08682b0202700ee7
SHA1208e79cdb96328d5929248bb8a4dd622cf0684d1
SHA2563ab3833e31e4083026421c641304369acfd31b957b78af81f3c6ef4968ef0e15
SHA5129916397b782aaafa68eb6a781ea9a0db27f914035dd586142c818ccbd7e69036896767bedba97489d5100de262a554cf14bcdf4a24edda2c5d37217b265398d3
-
Filesize
424KB
MD5e263c5b306480143855655233f76dc5a
SHA1e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA2561f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
129KB
MD50ec108e32c12ca7648254cf9718ad8d5
SHA178e07f54eeb6af5191c744ebb8da83dad895eca1
SHA25648b08ea78124ca010784d9f0faae751fc4a0c72c0e7149ded81fc03819f5d723
SHA5121129e685f5dd0cb2fa22ef4fe5da3f1e2632e890333ce17d3d06d04a4097b4d9f4ca7d242611ffc9e26079900945cf04ab6565a1c322e88e161f1929d18a2072
-
Filesize
184KB
MD5c9c341eaf04c89933ed28cbc2739d325
SHA1c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
SHA2561a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
SHA5127cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b
-
Filesize
20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
C:\Users\Admin\Documents\@[email protected]
Filesize933B
MD5f97d2e6f8d820dbd3b66f21137de4f09
SHA1596799b75b5d60aa9cd45646f68e9c0bd06df252
SHA2560e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a
SHA512efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0
-
Filesize
8KB
MD590ea51439c3cb111c10499b2df09f869
SHA145a3735e62f9ca94faf037273c5cbce51a0eaa8e
SHA25661af748c357e934d33f56734de241c89bb2e13a061b6d1aa7f0c1797f6aaf58a
SHA5123165c620ca866a41ef787184a3e8204d5bc43513a0c08882082fc03410d0fe7582bf07eabca2d3fc7f905eaee89e8624a48e6cc5c62f9a576372595bc7834ce8
-
Filesize
4KB
MD588044ca96fde1be1c30c35dfd0a47799
SHA15275c8cd1b2174d054cdf48f3da4e4caba637e3d
SHA25693da79086d4432bea05e44d35240b25eeb9216359fa58469d9f9a676e98f7fa7
SHA512f2df2196c68933f6830fe94288f9e9efc87168762e2e726de9943246fe577b8227b373b31faef6e9cf79d670d2689d33584edcd7800d77b6006369ec44967ad5
-
Filesize
184KB
MD5c796362136932d94f1c47a349a9c61fe
SHA1152519d89a888a54e94cfa8924cf7414ed4d0c41
SHA256a66bf1549f7bab43c6310f86f51babab9aa3359536c8841e28fd51f5d24f613e
SHA512cbda9c7e69b19f3dd2447da7ea5ebbfe4ae32a02632b140076b12cd50c3f5650a0409b325353fb82786ae3d6a802586250ab4631cacd187060fd164c4ab0a8ec
-
Filesize
67KB
MD55273029483e8165cc31937a9e8e4f366
SHA1231c0c04be69860c9f6b40dc755ac7a2d1c1f2ea
SHA256c2c82c154e7fc3f0dd09f16b9928b8720b7820a2dfa6c1640c894e88bf44f3cb
SHA5120c86e3b51be48ebbfb3a707a276e45f61ed1e966f3af81c01dbe7623d9199933f5325cff82fb2391efcd706a0c0d7c8a3eec79f03f60fbedfa0e30c4670071ac
-
Filesize
177KB
MD51807ed10424f82eee06db5aac64d3089
SHA1bc541fc52f4f3e11d46aa8d81f311a521f87e5a1
SHA25691e5cd0d9abe642b325d718b28d93c2014abf842cb048e04b5352ceaff16a49f
SHA512d6fdd7903e1a9ddfbb4ab0146a8b64baf59a75ed41614dbf70d89bafe87e7aa9bd59ffbcda7a1856d7a2687de7d40b41e084e0785275c3445779104566101b62